[solved]Key vault permissions with System Identiti...
# help-with-other
m
What role does the App need? when using RBCA roles (Azure AD) Right now the app has - Key Vault Secrets User (this should be enough imo for the connection string...) - Key Vault Certificate User - Key Vault Reader Not sure what I am missing 😦
Identity System assigned managed identity Status AccessToKeyVaultDenied Error details Key Vault reference was not able to be resolved because site was denied access to Key Vault reference's vault.
p
Hey Matt, I'm not sure if this is of any use at all, but I had to explicitly add 'Get' and 'List' for Secrets to allow me to read them. That said, this is to get Azure DevOps to read Key Vault into its App Settings, as opposed to the web app directly. Might need a similar approach. https://cdn.discordapp.com/attachments/1201575496006238340/1201821073088446504/image.png?ex=65cb3618&is=65b8c118&hm=da1125356ce068c7a90afe05f7506d02a5e17bc4a292716cd8d26649832a9409&
I set those under 'Access Policies'.
m
Cheers, mate I am trying to use Access controls (IAM) and as usual with Azure it works fine once you ask someone...
p
Amazing. Yeah I'm just reading around Access Policy vs RBCA. Looks like I should revisit my setup to use that when I get time.
m
You can't use a RBAC Keyvault set up for Managed Certificates (SSL) this only supports the old permissions. The only role your app should require is Keyvault Secrets User
Did you add both your Deployment Slot and your normal app?
m
I do need to check the slot actually now you mention it