You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/container-registry/container-registry-content-trust.md
+14-5Lines changed: 14 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -1,8 +1,9 @@
1
1
---
2
2
title: Manage signed images
3
3
description: Learn how to enable content trust for your Azure container registry, and push and pull signed images. Content trust implements Docker content trust and is a feature of the Premium service tier.
4
-
ms.topic: article
5
-
ms.date: 09/18/2020
4
+
ms.topic: how-to
5
+
ms.date: 06/25/2021
6
+
ms.custom: subject-rbac-steps
6
7
---
7
8
# Content trust in Azure Container Registry
8
9
@@ -74,11 +75,19 @@ Details for granting the `AcrImageSigner` role in the Azure portal and the Azure
74
75
75
76
### Azure portal
76
77
77
-
Navigate to your registry in the Azure portal, then select **Access control (IAM)** > **Add role assignment**. Under **Add role assignment**, select `AcrImageSigner` under **Role**, then **Select** one or more users or service principals, then **Save**.
78
+
1. Select **Access control (IAM)**.
78
79
79
-
In this example, two entities have been assigned the `AcrImageSigner` role: a service principal named "service-principal", and a user named "Azure User."
80
+
1. Select **Add** > **Add role assignment** to open the Add role assignment page.
80
81
81
-
![Grant ACR image signing permissions in the Azure portal][content-trust-02-portal]
82
+
1. Assign the following role. In this example, the role is assigned to an individual user. For detailed steps, see [Assign Azure roles using the Azure portal](../role-based-access-control/role-assignments-portal.md).
83
+
84
+
| Setting | Value |
85
+
| --- | --- |
86
+
| Role | AcrImageSigner |
87
+
| Assign access to | User |
88
+
| Members | Alain |
89
+
90
+

Copy file name to clipboardExpand all lines: articles/container-registry/container-registry-customer-managed-keys.md
+14-11Lines changed: 14 additions & 11 deletions
Original file line number
Diff line number
Diff line change
@@ -2,8 +2,8 @@
2
2
title: Encrypt registry with a customer-managed key
3
3
description: Learn about encryption-at-rest of your Azure container registry, and how to encrypt your Premium registry with a customer-managed key stored in Azure Key Vault
Configure a policy for the key vault so that the identity can access it. In the following [az keyvault set-policy][az-keyvault-set-policy] command, you pass the principal ID of the managed identity that you created, stored previously in an environment variable. Set key permissions to **get**, **unwrapKey**, and **wrapKey**.
115
+
#### Enable key vault access policy
116
+
117
+
One option is to configure a policy for the key vault so that the identity can access it. In the following [az keyvault set-policy][az-keyvault-set-policy] command, you pass the principal ID of the managed identity that you created, stored previously in an environment variable. Set key permissions to **get**, **unwrapKey**, and **wrapKey**.
116
118
117
119
```azurecli
118
120
az keyvault set-policy \
119
121
--resource-group <resource-group-name> \
120
122
--name <key-vault-name> \
121
123
--object-id $identityPrincipalID \
122
124
--key-permissions get unwrapKey wrapKey
125
+
123
126
```
127
+
#### Assign RBAC role
124
128
125
129
Alternatively, use [Azure RBAC for Key Vault](../key-vault/general/rbac-guide.md) to assign permissions to the identity to access the key vault. For example, assign the Key Vault Crypto Service Encryption role to the identity using the [az role assignment create](/cli/azure/role/assignment#az_role_assignment_create) command:
126
130
@@ -252,7 +256,9 @@ When creating a key vault for a customer-managed key, in the **Basics** tab, ena
252
256
253
257
### Enable key vault access
254
258
255
-
Configure a policy for the key vault so that the identity can access it.
259
+
#### Enable key vault access policy
260
+
261
+
One option is to configure a policy for the key vault so that the identity can access it.
Alternatively, use [Azure RBAC for Key Vault](../key-vault/general/rbac-guide.md) to assign permissions to the identity to access the key vault. For example, assign the Key Vault Crypto Service Encryption role to the identity.
271
+
#### Assign RBAC role
266
272
267
-
1. Navigate to your key vault.
268
-
1. Select **Access control (IAM)** > **+Add** > **Add role assignment**.
269
-
1. In the **Add role assignment** window:
270
-
1. Select **Key Vault Crypto Service Encryption User** role.
271
-
1. Assign access to **User assigned managed identity**.
272
-
1. Select the resource name of your user-assigned managed identity, and select **Save**.
273
+
Alternatively, assign the Key Vault Crypto Service Encryption User role to the user-assigned managed identity at the key vault scope.
274
+
275
+
For detailed steps, see [Assign Azure roles using the Azure portal](../role-based-access-control/role-assignments-portal.md).
0 commit comments