-
Notifications
You must be signed in to change notification settings - Fork 2.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Documentation update for Azure Key Vault Task #5037
Conversation
degant
commented
Aug 16, 2017
- General Formatting and Code formatting (wherever required)
- Updating Secrets to Secrets + Certificates since Azure KV now provides access policies for both separately
- General Formatting and Code formatting (wherever required) - Updating Secrets to Secrets + Certificates since Azure KV now provides access policies for both separately
take or close |
Tasks/AzureKeyVault/README.md
Outdated
|
||
### Parameters of the task: | ||
|
||
The parameters of the task are described below. The parameters listed with a \* are required parameters for the task: | ||
|
||
* **Azure Subscription**\*: Select the service endpoint for the Azure Subscription where the Azure Key vault instance is created. To configure new service endpoint, select the Azure subscription from the list and click 'Authorize'. If your subscription is not listed or if you want to use an existing Service Principal, you can setup an Azure service connection using 'Manage' link. | ||
|
||
Ensure the Azure endpoint has at least Get and List permissions on the vault. You can set these permissions in the Azure portal: | ||
Open the Settings blade for the vault, choose Access policies, then Add new.In the Add access policy blade, choose Select principal and select the service principal for your client account.In the Add access policy blade, choose Secret permissions and ensure that Get and List are checked (ticked). Choose OK to save the changes. | ||
Ensure the Azure endpoint has at least Get and List permissions for Secrets and Certificate Management on the vault. You can set these permissions in the Azure portal: Open the Settings blade for the vault, choose Access policies, then Add new. In the Add access policy blade, choose Select principal and select the service principal for your client account. In the Add access policy blade, choose `Secret permissions` and `Certificate permissions` and ensure that Get and List are checked (ticked) for both. Choose OK to save the changes. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This task handles only Secrets construct of Azure Key Vault. Azure has introduced Certificates construct recently hence we should not add certificates yet.
Tasks/AzureKeyVault/README.md
Outdated
|
||
### Parameters of the task: | ||
|
||
The parameters of the task are described below. The parameters listed with a \* are required parameters for the task: | ||
|
||
* **Azure Subscription**\*: Select the service endpoint for the Azure Subscription where the Azure Key vault instance is created. To configure new service endpoint, select the Azure subscription from the list and click 'Authorize'. If your subscription is not listed or if you want to use an existing Service Principal, you can setup an Azure service connection using 'Manage' link. | ||
|
||
Ensure the Azure endpoint has at least Get and List permissions on the vault. You can set these permissions in the Azure portal: | ||
Open the Settings blade for the vault, choose Access policies, then Add new.In the Add access policy blade, choose Select principal and select the service principal for your client account.In the Add access policy blade, choose Secret permissions and ensure that Get and List are checked (ticked). Choose OK to save the changes. | ||
Ensure the Azure endpoint has at least Get and List permissions for Secrets and Certificate Management on the vault. You can set these permissions in the Azure portal: Open the Settings blade for the vault, choose Access policies, then Add new. In the Add access policy blade, choose Select principal and select the service principal for your client account. In the Add access policy blade, choose `Secret permissions` and `Certificate permissions` and ensure that Get and List are checked (ticked) for both. Choose OK to save the changes. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Remove Certificate permissions
@degant, @Lovakumar Can one of you please make the change that lova has requested? |