Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit cc0bc0a

Browse files
committedJun 25, 2021
[ACR] RBAC UI updates
1 parent 690589d commit cc0bc0a

File tree

3 files changed

+28
-16
lines changed

3 files changed

+28
-16
lines changed
 

‎articles/container-registry/container-registry-content-trust.md

Lines changed: 14 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,9 @@
11
---
22
title: Manage signed images
33
description: Learn how to enable content trust for your Azure container registry, and push and pull signed images. Content trust implements Docker content trust and is a feature of the Premium service tier.
4-
ms.topic: article
5-
ms.date: 09/18/2020
4+
ms.topic: how-to
5+
ms.date: 06/25/2021
6+
ms.custom: subject-rbac-steps
67
---
78
# Content trust in Azure Container Registry
89

@@ -74,11 +75,19 @@ Details for granting the `AcrImageSigner` role in the Azure portal and the Azure
7475

7576
### Azure portal
7677

77-
Navigate to your registry in the Azure portal, then select **Access control (IAM)** > **Add role assignment**. Under **Add role assignment**, select `AcrImageSigner` under **Role**, then **Select** one or more users or service principals, then **Save**.
78+
1. Select **Access control (IAM)**.
7879

79-
In this example, two entities have been assigned the `AcrImageSigner` role: a service principal named "service-principal", and a user named "Azure User."
80+
1. Select **Add** > **Add role assignment** to open the Add role assignment page.
8081

81-
![Grant ACR image signing permissions in the Azure portal][content-trust-02-portal]
82+
1. Assign the following role. In this example, the role is assigned to an individual user. For detailed steps, see [Assign Azure roles using the Azure portal](../role-based-access-control/role-assignments-portal.md).
83+
84+
| Setting | Value |
85+
| --- | --- |
86+
| Role | AcrImageSigner |
87+
| Assign access to | User |
88+
| Members | Alain |
89+
90+
![Add role assignment page in Azure portal.](../../includes/role-based-access-control/media/add-role-assignment-page.png)
8291

8392
### Azure CLI
8493

‎articles/container-registry/container-registry-customer-managed-keys.md

Lines changed: 14 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
title: Encrypt registry with a customer-managed key
33
description: Learn about encryption-at-rest of your Azure container registry, and how to encrypt your Premium registry with a customer-managed key stored in Azure Key Vault
44
ms.topic: article
5-
ms.date: 05/27/2021
6-
ms.custom:
5+
ms.date: 06/25/2021
6+
ms.custom: subject-rbac-steps
77
---
88

99
# Encrypt registry using a customer-managed key
@@ -112,15 +112,19 @@ keyvaultID=$(az keyvault show --resource-group <resource-group-name> --name <key
112112

113113
### Enable key vault access
114114

115-
Configure a policy for the key vault so that the identity can access it. In the following [az keyvault set-policy][az-keyvault-set-policy] command, you pass the principal ID of the managed identity that you created, stored previously in an environment variable. Set key permissions to **get**, **unwrapKey**, and **wrapKey**.
115+
#### Enable key vault access policy
116+
117+
One option is to configure a policy for the key vault so that the identity can access it. In the following [az keyvault set-policy][az-keyvault-set-policy] command, you pass the principal ID of the managed identity that you created, stored previously in an environment variable. Set key permissions to **get**, **unwrapKey**, and **wrapKey**.
116118

117119
```azurecli
118120
az keyvault set-policy \
119121
--resource-group <resource-group-name> \
120122
--name <key-vault-name> \
121123
--object-id $identityPrincipalID \
122124
--key-permissions get unwrapKey wrapKey
125+
123126
```
127+
#### Assign RBAC role
124128

125129
Alternatively, use [Azure RBAC for Key Vault](../key-vault/general/rbac-guide.md) to assign permissions to the identity to access the key vault. For example, assign the Key Vault Crypto Service Encryption role to the identity using the [az role assignment create](/cli/azure/role/assignment#az_role_assignment_create) command:
126130

@@ -252,7 +256,9 @@ When creating a key vault for a customer-managed key, in the **Basics** tab, ena
252256

253257
### Enable key vault access
254258

255-
Configure a policy for the key vault so that the identity can access it.
259+
#### Enable key vault access policy
260+
261+
One option is to configure a policy for the key vault so that the identity can access it.
256262

257263
1. Navigate to your key vault.
258264
1. Select **Settings** > **Access policies > +Add Access Policy**.
@@ -262,14 +268,11 @@ Configure a policy for the key vault so that the identity can access it.
262268

263269
:::image type="content" source="media/container-registry-customer-managed-keys/add-key-vault-access-policy.png" alt-text="Create key vault access policy":::
264270

265-
Alternatively, use [Azure RBAC for Key Vault](../key-vault/general/rbac-guide.md) to assign permissions to the identity to access the key vault. For example, assign the Key Vault Crypto Service Encryption role to the identity.
271+
#### Assign RBAC role
266272

267-
1. Navigate to your key vault.
268-
1. Select **Access control (IAM)** > **+Add** > **Add role assignment**.
269-
1. In the **Add role assignment** window:
270-
1. Select **Key Vault Crypto Service Encryption User** role.
271-
1. Assign access to **User assigned managed identity**.
272-
1. Select the resource name of your user-assigned managed identity, and select **Save**.
273+
Alternatively, assign the Key Vault Crypto Service Encryption User role to the user-assigned managed identity at the key vault scope.
274+
275+
For detailed steps, see [Assign Azure roles using the Azure portal](../role-based-access-control/role-assignments-portal.md).
273276

274277
### Create key (optional)
275278

0 commit comments

Comments
 (0)