You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Jan 21, 2026. It is now read-only.
1. On the **Access policy** tab of the **Create key vault** blade, click **+ Add Access Policy** to setup a new policy.
127
+
1. On the **Access policy** tab of the **Create key vault** blade, click **+ Create** to setup a new policy.
128
128
129
129
> **Note**: You need to secure access to your key vaults by allowing only authorized applications and users. To access the data from the vault, you will need to provide read (Get) permissions to the service principal that you will be using for authentication in the pipeline.
130
130
131
-
1. On the **Add access policy** blade, click the **None selected** link directly under the **Select principal** label.
131
+
1. On the **Create an access policy** blade, click the **None selected** link directly under the **Select principal** label.
132
132
1. On the **Principal** blade, search for the security principal that you created in the previous exercise, select it, and then click **Select**.
133
133
134
134
> **Note**: You can search by name or ID of the principal.
135
135
136
-
1. Back on the **Add access policy** blade, in the **Secret permissions** drop down list, select checkboxes next to the **Get** and **List** permissions and then click **Add**.
136
+
1. Back on the **Create an access policy** blade, in the **Secret permissions** drop down list, select checkboxes next to the **Get** and **List** permissions and then click **Add**.
137
137
1. Back on the **Access policy** tab of the **Create key vault** blade, click **Review + create** and, on the **Review + create** blade, click **Create**.
138
138
139
139
> **Note**: Wait for the Azure Key vault to be provisioned. This should take less than 1 minute.
140
140
141
141
1. On the **Your deployment is complete** blade, click **Go to resource**.
142
-
1. On the Azure Key vault blade, in the vertical menu on the left side of the blade, in the **Settings** section, click **Secrets**.
142
+
1. On the Azure Key vault blade, in the vertical menu on the left side of the blade, in the **Objects** section, click **Secrets**.
143
143
1. On the **Secrets** blade, click **Generate/Import**.
144
144
1. On the **Create a secret** blade, specify the following settings and click **Create** (leave others with their default values):
0 commit comments