Skip to content

Commit 6704530

Browse files
Merge pull request #311421 from AbhishekMallick-MS/Feb-5-2026-UUF
Addressed UUF #271130 - Added link to the role
2 parents 0bb502a + 9100073 commit 6704530

1 file changed

Lines changed: 2 additions & 2 deletions

File tree

articles/backup/save-backup-passphrase-securely-in-azure-key-vault.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Save and manage MARS agent passphrase securely in Azure Key Vault
33
description: Learn how to save MARS agent passphrase securely in Azure Key Vault and retrieve them during restore.
44
ms.topic: how-to
5-
ms.date: 10/10/2025
5+
ms.date: 02/05/2026
66
ms.reviewer: sooryar
77
ms.service: azure-backup
88
ms.custom: devx-track-azurecli, devx-track-azurepowershell
@@ -125,7 +125,7 @@ To assign the permissions, follow these steps:
125125

126126
3. The Recovery Services vault identity requires the **Set permission on Secret** to create and add the passphrase as a Secret to the Key Vault.
127127

128-
You can select a *built-in role* such as **Key Vault Secrets Officer** that has the permission (along with other permissions not required for this feature) or [create a custom role](/azure/key-vault/general/rbac-guide?tabs=azurepowershell#creating-custom-roles) with only Set permission on Secret.
128+
You can select a *built-in role* such as [**Key Vault Secrets Officer**](/azure/role-based-access-control/built-in-roles/security#key-vault-secrets-officer) that has the permission (along with other permissions not required for this feature) or [create a custom role](/azure/key-vault/general/rbac-guide?tabs=azurepowershell#creating-custom-roles) with only Set permission on Secret.
129129

130130
Under **Details**, select **View** to view the permissions granted by the role and ensure *Set* permission on *Secret* is available.
131131

0 commit comments

Comments
 (0)