Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature Request - customizable Azure Key Vault values policies #1849

Open
tom-tsabar opened this issue Nov 26, 2024 · 1 comment
Open

Feature Request - customizable Azure Key Vault values policies #1849

tom-tsabar opened this issue Nov 26, 2024 · 1 comment

Comments

@tom-tsabar
Copy link

Hey,
I would like to be able to create a custom Azure policy, with custom non-compliance message that able to Deny creation or modification of Key Vault values (Like Keys, Certificate or Secrets) if certain conditions hold.

As for now Azure policies for Key Vault values with Deny effect just doesn't work...

These types of Azure policies do exist as built-ins like policy but can't be customized in general.
Their assignment can't even get a customizable non-compliance message.

@tom-tsabar tom-tsabar changed the title Feature Request - customizable Azure Key Vault policies Feature Request - customizable Azure Key Vault values policies Nov 26, 2024
@Springstone
Copy link
Member

@tom-tsabar thanks for reaching out. Key Vault is a special resource and works differently than normal resource policies. For obvious reasons, it's not possible to manipulate the contents of a Key Vault, however, you can interact with attributes (not values). Key Vault is a resource that uses a special Resource Provider mode to allow management of the vault. This mode is different to traditional policy modes and surfaces compliance differently in the portal (under Component Compliance - instead of Resource Compliance), and this is why you can't set a custom non-compliance message at this time.

I recommend reviewing the following documents:

Depending on what you're doing in your Policy, you may need to ensure you are using the Resource Provider mode instead of the normal "Indexed" / "All".

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants