Skip to content

Commit 14bd359

Browse files
authored
Moved 'important' note up closer to the table it's referencing
Moved 'important' note up closer to the table it's referencing
1 parent 75fbf1c commit 14bd359

1 file changed

Lines changed: 3 additions & 3 deletions

File tree

articles/app-service/configure-ssl-certificate.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -156,6 +156,9 @@ The service principal app ID or assignee value is the ID for the App Service res
156156
> [!NOTE]
157157
> Don't delete these permissions from Key Vault. If you do, App Service can't sync your web app with the latest Key Vault certificate version.
158158
159+
> [!IMPORTANT]
160+
> The values in the table are application (client) IDs. If you grant the Key Vault Certificate User role by using infrastructure-as-code (for example, ARM templates or Bicep), you typically must use the object ID of the corresponding enterprise application (service principal) in your Microsoft Entra tenant. Using the application ID works with some tooling (for example, Azure CLI role assignment), but ARM/Bicep role assignments generally require the service principal object ID.
161+
159162
#### [Azure CLI](#tab/azure-cli/rbac)
160163

161164
```azurecli-interactive
@@ -171,9 +174,6 @@ New-AzRoleAssignment -RoleDefinitionName "Key Vault Certificate User" -Applicati
171174

172175
---
173176

174-
> [!IMPORTANT]
175-
> The values in the table are application (client) IDs. If you grant the Key Vault Certificate User role by using infrastructure-as-code (for example, ARM templates or Bicep), you typically must use the object ID of the corresponding enterprise application (service principal) in your Microsoft Entra tenant. Using the application ID works with some tooling (for example, Azure CLI role assignment), but ARM/Bicep role assignments generally require the service principal object ID.
176-
177177
> [!NOTE]
178178
> If Key Vault is configured to disable public access, select the **Allow trusted Microsoft services to bypass this firewall** checkbox to ensure that Microsoft services are allowed access. For more information, see [Key Vault firewall-enabled trusted services only](/azure/key-vault/general/network-security?WT.mc_id=Portal-Microsoft_Azure_KeyVault#key-vault-firewall-enabled-trusted-services-only).
179179

0 commit comments

Comments
 (0)