-
Notifications
You must be signed in to change notification settings - Fork 1.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Lab 7 RBAC default for access #810
Comments
Exercise 1 > Task 3: Create an Azure Key Vault > Step 4 the instruction says to choose Vault access policy here, before creating the key vault. Not sure if we need to modify the lab instruction here, please suggest. |
sorry, nothing needed then :) was surprised as two learner got same issue (probably both skipped the task) |
@unaihuete93 This is a step that before the start of the lab I always explain to students as a lot of then skip the task and because by default is RBAC.... @msftnutta @JeffKoMS, Wouldn't using RBAC be a better option for the lab, as this is the recommended model for Azure Key Vault? |
I'd would also like to see a switch to Entra ID AuthN for all services where this is supported, and avoiding the use of SAS tokens. There is reason to use SAS in this lab, we could easily change to RBAC. |
It will depend on the scenario. For app registrations (service principals) it's recommend to use OpenID or Managed Identities - RBAC is no longer recommended for that. Making these kinds of changes will take a bit of effort and I'd like to tie that to an overall lab revamp. |
Module/Lab: 07
Exercise: 00
Task 3: Configure a Key Vault access policy
Step: 00
Description of issue: access policies cannot be used, as Key Vault has RBAC mode chosen as default. we can change it from Access Configuration
The text was updated successfully, but these errors were encountered: