You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/read-from-keyvault.md
+12-11Lines changed: 12 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,8 +1,8 @@
1
-
# Use Blobfuse CSI Driver with Azure Key Vault
1
+
# Use Blobfuse CSI Driver with storage account key(or sastoken) stored in Azure Key Vault
2
2
3
3
> Attention: Currently, we just support use Key Vault in static provisioning scenario.
4
4
5
-
## Prepare Key Vault
5
+
## Prerequisite
6
6
7
7
1. Create an Azure Key Vault
8
8
@@ -12,11 +12,14 @@
12
12
13
13
```console
14
14
# Assign Reader Role to the service principal for your keyvault
15
-
az role assignment create --role Reader --assignee <YOUR SPN CLIENT ID> --scope /subscriptions/<subscriptionid>/resourcegroups/<resourcegroup>/providers/Microsoft.KeyVault/vaults/$keyvaultname
16
-
17
-
az keyvault set-policy -n $keyvaultname --key-permissions get --spn <YOUR SPN CLIENT ID>
18
-
az keyvault set-policy -n $keyvaultname --secret-permissions get --spn <YOUR SPN CLIENT ID>
19
-
az keyvault set-policy -n $keyvaultname --certificate-permissions get --spn <YOUR CLIENT ID>
15
+
aadclientid=
16
+
keyvaultname=
17
+
18
+
az role assignment create --role Reader --assignee $aadclientid --scope /subscriptions/<subscriptionid>/resourcegroups/<resourcegroup>/providers/Microsoft.KeyVault/vaults/$keyvaultname
19
+
20
+
az keyvault set-policy -n $keyvaultname --key-permissions get --spn $aadclientid
21
+
az keyvault set-policy -n $keyvaultname --secret-permissions get --spn $aadclientid
22
+
az keyvault set-policy -n $keyvaultname --certificate-permissions get --spn $aadclientid
20
23
```
21
24
22
25
## Install blobfuse CSI driver on a kubernetes cluster
0 commit comments