Skip to content

Commit 52ff521

Browse files
Merge pull request #314603 from yutanglin16/patch-32
Rearrange Key Vault access policy notes for improved clarity
2 parents 310863b + 14bd359 commit 52ff521

1 file changed

Lines changed: 7 additions & 9 deletions

File tree

articles/app-service/configure-ssl-certificate.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -143,9 +143,6 @@ By default, the App Service resource provider doesn't have access to your key va
143143

144144
The service principal app ID or assignee value is the application (client) ID for the App Service resource provider.
145145

146-
> [!IMPORTANT]
147-
> The values in the table are application (client) IDs. If you grant the Key Vault Certificate User role by using infrastructure-as-code (for example, ARM templates or Bicep), you typically must use the object ID of the corresponding enterprise application (service principal) in your Microsoft Entra tenant. Using the application ID works with some tooling (for example, Azure CLI role assignment), but ARM/Bicep role assignments generally require the service principal object ID.
148-
149146
### [Access policy permissions](#tab/accesspolicy)
150147

151148
| Resource provider | Service principal app ID | Key Vault secret permissions | Key Vault certificate permissions |
@@ -154,12 +151,13 @@ The service principal app ID or assignee value is the application (client) ID fo
154151

155152
The service principal app ID or assignee value is the ID for the App Service resource provider. To learn how to authorize Key Vault permissions for the App Service resource provider by using an access policy, see [Assign a Key Vault access policy](/azure/key-vault/general/assign-access-policy?tabs=azure-portal).
156153

157-
Don't delete these access policy permissions from the key vault. If you do, App Service can't sync your web app with the latest Key Vault certificate version.
158-
159154
---
160155

161156
> [!NOTE]
162-
> If Key Vault is configured to disable public access, select the **Allow trusted Microsoft services to bypass this firewall** checkbox to ensure that Microsoft services are allowed access. For more information, see [Key Vault firewall-enabled trusted services only](/azure/key-vault/general/network-security?WT.mc_id=Portal-Microsoft_Azure_KeyVault#key-vault-firewall-enabled-trusted-services-only).
157+
> Don't delete these permissions from Key Vault. If you do, App Service can't sync your web app with the latest Key Vault certificate version.
158+
159+
> [!IMPORTANT]
160+
> The values in the table are application (client) IDs. If you grant the Key Vault Certificate User role by using infrastructure-as-code (for example, ARM templates or Bicep), you typically must use the object ID of the corresponding enterprise application (service principal) in your Microsoft Entra tenant. Using the application ID works with some tooling (for example, Azure CLI role assignment), but ARM/Bicep role assignments generally require the service principal object ID.
163161
164162
#### [Azure CLI](#tab/azure-cli/rbac)
165163

@@ -174,11 +172,11 @@ az role assignment create --role "Key Vault Certificate User" --assignee "abfa0a
174172
New-AzRoleAssignment -RoleDefinitionName "Key Vault Certificate User" -ApplicationId "abfa0a7c-a6b6-4736-8310-5855508787cd" -Scope "/subscriptions/{subscriptionid}/resourcegroups/{resource-group-name}/providers/Microsoft.KeyVault/vaults/{key-vault-name}"
175173
```
176174

177-
> [!NOTE]
178-
> Don't delete these RBAC permissions from Key Vault. If you do, App Service can't sync your web app with the latest Key Vault certificate version.
179-
180175
---
181176

177+
> [!NOTE]
178+
> If Key Vault is configured to disable public access, select the **Allow trusted Microsoft services to bypass this firewall** checkbox to ensure that Microsoft services are allowed access. For more information, see [Key Vault firewall-enabled trusted services only](/azure/key-vault/general/network-security?WT.mc_id=Portal-Microsoft_Azure_KeyVault#key-vault-firewall-enabled-trusted-services-only).
179+
182180
### Import a certificate from your vault to your app
183181

184182
1. In the [Azure portal](https://portal.azure.com), on the left pane, select **App Services** > *\<app-name>*.

0 commit comments

Comments
 (0)