0

I’m working on enabling Azure Key Vault backup. I need to gather secrets, keys, certificates, and access policies, then save them to a storage account. However, I’ve encountered an issue where the Azure Key Vault cannot retrieve the access policies information, even though I have Key Vault Administrator permissions.

This problem does not occur in other key vaults I’ve tested. I would like to know if there is an issue with my PowerShell script or a misconfiguration in the key vault.

My test case:

1. 2 Key Vaults with same data and configuration and the Key Vault Administrator granted for both key vaults.

2. My PowerShell test result.

PS C:\Users\azureadmin> $keyVaultAccessPolicies = Get-AzKeyVault -VaultName kv-eas-kvauto-01

PS C:\Users\azureadmin> Write-Output $keyVaultAccessPolicies.AccessPolicies

Tenant ID : xxxxxx-xxxxxx-xxxxx-xxxxx-xxxxxx Object ID : xxxxxx-xxxx-xxxx-xxxx-xxxx Application ID : Display Name : xxxxxxxxxxxxxxx Permissions to Keys : {Get, List, Update, Create...} Permissions to Secrets : {Get, List, Set, Delete...} Permissions to Certificates : {Get, List, Update, Create...} Permissions to (Key Vault Managed) Storage : {}

PS C:\Users\azureadmin> $keyVaultAccessPolicies = Get-AzKeyVault -VaultName kv-eas-kvauto-02

PS C:\Users\azureadmin> Write-Output $keyVaultAccessPolicies.AccessPolicies

PS C:\Users\azureadmin>

0 Answers0