Hello Shivaji Kaleru
Please refer this Microsoft Document for migrating Azure Key Vault access policies to Azure RBAC https://learn.microsoft.com/en-us/azure/key-vault/general/rbac-migration?tabs=cliBefore starting the migration, ensure you have:
Required permissions: You must have the following permissions on the key vault:
-
Microsoft.Authorization/roleAssignments/writepermission, included in Owner and User Access Administrator roles-
Microsoft.KeyVault/vaults/writepermission, included in the Key Vault Contributor role
-
Inventory current access policies
Document all existing access policies, noting the security principals (users, groups, service principals) and their permissions.
In the Azure portal:
- Navigate to your key vault
- Select Access policies under Settings
- Document all existing access policies, noting:
- Identity (user, group, or service principal)
- Key, Secret, and Certificate permissions granted
- Identity (user, group, or service principal)
Create equivalent Azure RBAC role assignments
For each security principal with an access policy, create one or more Azure RBAC role assignments based on the mapping table above.
In the Azure portal:
- Navigate to your key vault
- Select Access control (IAM)
- Click Add > Add role assignment
- Select the appropriate role based on the access policy mapping
- Search for and select the user, group, or service principal
- Click Review + assign to create the role assignment
- Repeat for each identity that needs access
Enable Azure RBAC
After creating all necessary role assignments, switch the vault to use the Azure RBAC permission model.
In the Azure portal:
- Navigate to your key vault
- Select Properties under Settings
- Change Permission model to Azure role-based access control
- Click Save
Validate access
Test access to the vault to ensure all applications and users can still perform required operations.
In the Azure portal:
- Try to access secrets, keys, or certificates based on your assigned roles
- Verify that applications using the vault still function correctly
After migration, set up proper monitoring to detect any access issues.Before starting the migration, ensure you have:
Required permissions: You must have the following permissions on the key vault:
-
Microsoft.Authorization/roleAssignments/writepermission, included in Owner and User Access Administrator roles-
Microsoft.KeyVault/vaults/writepermission, included in the Key Vault Contributor role
-
Inventory current access policies
Document all existing access policies, noting the security principals (users, groups, service principals) and their permissions.
In the Azure portal:
- Navigate to your key vault
- Select Access policies under Settings
- Document all existing access policies, noting:
- Identity (user, group, or service principal)
- Key, Secret, and Certificate permissions granted
- Identity (user, group, or service principal)
Create equivalent Azure RBAC role assignments
For each security principal with an access policy, create one or more Azure RBAC role assignments based on the mapping table above.
In the Azure portal:
- Navigate to your key vault
- Select Access control (IAM)
- Click Add > Add role assignment
- Select the appropriate role based on the access policy mapping
- Search for and select the user, group, or service principal
- Click Review + assign to create the role assignment
- Repeat for each identity that needs access
Enable Azure RBAC
After creating all necessary role assignments, switch the vault to use the Azure RBAC permission model.
In the Azure portal:
- Navigate to your key vault
- Select Properties under Settings
- Change Permission model to Azure role-based access control
- Click Save
Validate access
Test access to the vault to ensure all applications and users can still perform required operations.
In the Azure portal:
- Try to access secrets, keys, or certificates based on your assigned roles
- Verify that applications using the vault still function correctly
After migration, set up proper monitoring to detect any access issues.