You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
### ⚠️ One-Time Prerequisite: Grant Role Assignment Permission
461
+
462
+
The Bicep deployment creates RBAC role assignments (granting each Web App's managed identity access to Key Vault). By default, a service principal with **Contributor** role cannot create role assignments — it also needs **User Access Administrator**.
463
+
464
+
**Grant it in the Azure Portal:**
465
+
466
+
1. Go to **portal.azure.com → Resource Groups → rg-talent-dev**
467
+
2. Click **Access control (IAM)** in the left menu
5. Click **+ Select members**, search for your service principal (e.g. `github-angularnettutorial`), select it
471
+
6. Click **Next** — Azure shows a role assignment condition dialog with three options:
472
+
* Allow user to only assign selected roles to selected principals (fewer privileges)
473
+
* **Allow user to assign all roles except privileged administrator roles Owner, UAA, RBAC (Recommended)** ← select this
474
+
* Allow user to assign all roles (highly privileged)
475
+
7. Click **Review + assign**
476
+
477
+
**Why the Recommended option?** The Bicep only assigns the `Key Vault Secrets User` role — a standard, non-privileged role. The recommended option allows assigning standard roles while blocking the highest-privilege roles (Owner, User Access Administrator itself, RBAC Administrator). This follows the principle of least privilege — enough permission to wire up managed identities, not enough to escalate to subscription owner.
0 commit comments