ערוך

שתף באמצעות


Assign a Key Vault access policy (legacy)

Important

When using the Access Policy permission model, a user with the Contributor, Key Vault Contributor, or any other role that includes Microsoft.KeyVault/vaults/write permissions for the key vault management plane can grant themselves data plane access by setting a Key Vault access policy. To prevent unauthorized access and management of your key vaults, keys, secrets, and certificates, it's essential to limit Contributor role access to key vaults under the Access Policy permission model. To mitigate this risk, we recommend you use the Role-Based Access Control (RBAC) permission model, which restricts permission management to the 'Owner' and 'User Access Administrator' roles, allowing a clear separation between security operations and administrative duties. See the Key Vault RBAC Guide and What is Azure RBAC? for more information.

A Key Vault access policy determines whether a given security principal, namely a user, application or user group, can perform different operations on Key Vault secrets, keys, and certificates. You can assign access policies using the Azure portal, the Azure CLI, or Azure PowerShell.

Key vault supports up to 1024 access policy entries, with each entry granting a distinct set of permissions to a particular security principal. Because of this limitation, we recommend assigning access policies to groups of users, where possible, rather than individual users. Using groups makes it much easier to manage permissions for multiple people in your organization. For more information, see Manage app and resource access using Microsoft Entra groups.

Assign an access policy

  1. In the Azure portal, navigate to the Key Vault resource.

  2. Select Access policies, then select Create:

    Select Access policies, selecting Add role assignment

  3. Select the permissions you want under Key permissions, Secret permissions, and Certificate permissions.

    Specifying access policy permissions

  4. Under the Principal selection pane, enter the name of the user, app or service principal in the search field and select the appropriate result.

    Selecting the security principal for the access policy

    If you're using a managed identity for the app, search for and select the name of the app itself. (For more information on security principals, see Key Vault authentication.

  5. Review the access policy changes and select Create to save the access policy.

    Adding the access policy with the security principal assigned

  6. Back on the Access policies page, verify that your access policy is listed.

    Saving the access policy changes

Next steps