Skip to content

Commit ef8820d

Browse files
authored
Merge pull request #4 from msangapu-msft/patch-16
Update configure-ssl-certificate.md
2 parents a71a20d + 10d0356 commit ef8820d

File tree

1 file changed

+6
-2
lines changed

1 file changed

+6
-2
lines changed

articles/app-service/configure-ssl-certificate.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -143,12 +143,12 @@ By default, the App Service resource provider doesn't have access to your key va
143143

144144
The service principal app ID or assignee value is the ID for the App Service resource provider. To learn how to authorize key vault permissions for the App Service resource provider using an access policy, see the [provide access to Key Vault keys, certificates, and secrets with an Azure role-based access control documentation](/azure/key-vault/general/rbac-guide?tabs=azure-portal#key-vault-scope-role-assignment).
145145

146-
### [Azure CLI](#tab/RBAC-CLI)
146+
#### [Azure CLI](#tab/RBAC-CLI)
147147
```azurecli-interactive
148148
az role assignment create --role "Key Vault Certificate User" --assignee "abfa0a7c-a6b6-4736-8310-5855508787cd" --scope "/subscriptions/{subscriptionid}/resourcegroups/{resource-group-name}/providers/Microsoft.KeyVault/vaults/{key-vault-name}"
149149
```
150150

151-
### [Azure PowerShell](#tab/RBAC-PS)
151+
#### [Azure PowerShell](#tab/RBAC-PS)
152152
```azurepowershell
153153
#Assign by Service Principal ApplicationId
154154
New-AzRoleAssignment -RoleDefinitionName "Key Vault Certificate User" -ApplicationId "abfa0a7c-a6b6-4736-8310-5855508787cd" -Scope "/subscriptions/{subscriptionid}/resourcegroups/{resource-group-name}/providers/Microsoft.KeyVault/vaults/{key-vault-name}"
@@ -157,6 +157,8 @@ New-AzRoleAssignment -RoleDefinitionName "Key Vault Certificate User" -Applicati
157157
> [!NOTE]
158158
> Do not delete these RBAC permissions from key vault. If you do, App Service will not be able to sync your web app with the latest key vault certificate version.
159159
160+
---
161+
160162

161163
### [Access policy permissions](#tab/accesspolicy)
162164

@@ -171,6 +173,8 @@ The service principal app ID or assignee value is the ID for the App Service res
171173
172174
---
173175

176+
177+
174178
### Import a certificate from your vault to your app
175179

176180
1. In the [Azure portal](https://portal.azure.com), from the left menu, select **App Services** > **\<app-name>**.

0 commit comments

Comments
 (0)