Skip to content

Commit a2c565b

Browse files
authored
Update Note for KV Perms
Update Note for KV Perms
1 parent 934854f commit a2c565b

1 file changed

Lines changed: 3 additions & 7 deletions

File tree

articles/app-service/configure-ssl-app-service-certificate.md

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -71,8 +71,6 @@ By default, the App Service certificate resource provider doesn't have access to
7171

7272
The service principal app ID or assignee value is the application (client) ID for the App Service certificate resource provider.
7373

74-
Don't delete these access policy permissions from the key vault. If you do, App Service certificate can't store, renew, or rekey the certificate in key vault.
75-
7674
#### [Access policy permissions](#tab/accesspolicy)
7775

7876
| Resource provider | Service principal app ID | Key Vault secret permissions | Key Vault certificate permissions |
@@ -81,10 +79,11 @@ Don't delete these access policy permissions from the key vault. If you do, App
8179

8280
The service principal app ID or assignee value is the ID for the App Service certificate resource provider. To learn how to authorize Key Vault permissions for the App Service certificate resource provider by using an access policy, see [Assign a Key Vault access policy](/azure/key-vault/general/assign-access-policy?tabs=azure-portal).
8381

84-
Don't delete these permissions from the key vault. If you do, App Service certificate can't store, renew, or rekey the certificate in key vault.
85-
8682
---
8783

84+
> [!NOTE]
85+
> Don't delete these permissions from the key vault. If you do, App Service certificate can't store, renew, or rekey the certificate in key vault.
86+
8887
> [!IMPORTANT]
8988
> The values in the table are application (client) IDs. If you grant the Key Vault Certificate User role by using infrastructure-as-code (for example, ARM templates or Bicep), you typically must use the object ID of the corresponding enterprise application (service principal) in your Microsoft Entra tenant. Using the application ID works with some tooling (for example, Azure CLI role assignment), but ARM/Bicep role assignments generally require the service principal object ID.
9089
@@ -102,9 +101,6 @@ New-AzRoleAssignment -RoleDefinitionName "Key Vault Secrets Officer" -Applicatio
102101
```
103102
---
104103

105-
> [!NOTE]
106-
> Don't delete these permissions from the key vault. If you do, App Service certificate can't store, renew, or rekey the certificate in key vault.
107-
108104

109105
#### Store the certificate in Azure Key Vault
110106

0 commit comments

Comments
 (0)