Key Vault RBAC Migration

Microsoft is shifting Azure Key Vault toward Azure RBAC as the default access control model for all new Key Vaults starting with API version 2026‑02‑01. Read more herearrow-up-right.

While RBAC isn’t strictly mandatory and existing Key Vaults using access policies can continue operating as is, tenants that create a new Key Vault after upgrading to the new API will get RBAC by default unless access policies are explicitly configured.

It may be a good idea to migrate to RBAC regardless, as it provides a more unified and scalable permission model aligned with Microsoft Entra ID and future-proofs your setup in the event Microsoft deprecates Key Vault access policies.

Migration Guide

circle-exclamation
1

Navigate to Azure > Key Vaults > Your SCEPman Key Vault

2

Review your existing Access Policies

Navigate to Access policies and document your SCEPman's access policies under Application. The SCEPman access policies should share the same name as your SCEPman App Service (and any geo-redundant SCEPman App Services).

User access policies do not need to be migrated as they won't affect SCEPman functionality. Users that require continued access should have their access policies reviewed and migrated to Azure roles based on the following table: https://learn.microsoft.com/en-us/azure/key-vault/general/rbac-migration?tabs=cli#access-policy-templates-to-azure-roles-mappingarrow-up-right

3

Change the Permission Model

Change the Permission Model from Vault access policy to Azure role-based access control

Pressing Apply will disconnect your SCEPman instance from the Key Vault until Azure Roles are assigned. Previous access policies will also be removed.

4

Assign Azure Roles

Navigate to Access control (IAM) and assign the following roles to the managed identity of your SCEPman App Service (and any geo-redundant SCEPman App Services):

  • Key Vault Certificates Officer

  • Key Vault Crypto Officer

  • Key Vault Secrets User

Roles must be assigned one at a time, however multiple identities can be assigned to one role.

The Certificate Master's managed identity (with -cm in its name) does not require access to the Key Vault.

5

Check Key Vault Connectivity

Restart your SCEPman App Service, then navigate to your SCEPman homepage and ensure your Key Vault is connected.

Last updated

Was this helpful?