Azure RBAC (Role-based Access Control)
Follow the steps below to create a key vault:
- Open the Microsoft Azure portal.
- Search for Key vaults, and then click the result to access the Key vaults page.
- Click Create. The Create a key vault page appears.
- In the Basics tab, provide the basic information for the key vault, and then click the Access configuration tab.
- In the Permission model section, select Azure role-based access control (recommended).
- Click the Networking tab.
- Select Enable public access which allows all networks to connect to this
key vault.Note: If you only allow IBM® Storage Protect for Cloud and the IBM cloud services you are using to connect to this key vault, you can edit the key vault’s firewall settings after the key vault provisioning.
- Click the Tags tab, and you can add tags to categorize your key vault.
- Click Review + create to review all of your configurations first, and
then click Create at the bottom to create the key vault.Note: If you need to change some settings before creating the key vault, you can click the Previous button to change previous settings.
After the key vault is created, follow the steps below to assign the role:
- Open the Microsoft Azure portal, and navigate to the Key Vaults resource.
- Click Access control (IAM) in the Key Vault’s menu.
- Click Add and select Add role assignment.
- In the Role list, select Key Vault Crypto User.
- Go to the Members tab.
- In the Assign access to section, select User, group, or service principal.
- Click Select members.
- Search for and select your application.
- Click Review+assign to complete the role assignment.