-
Notifications
You must be signed in to change notification settings - Fork 3.3k
Closed
Description
This is autogenerated. Please review and update as needed.
Describe the bug
Command Name
az keyvault set-policy
Errors:
ValidationError: specify at least one: --key-permissions, --secret-permissions, --certificate-permissions --storage-permissions
To Reproduce:
Steps to reproduce the behavior. Note that argument values have been redacted, as they may contain sensitive information.
az keyvault set-policy --name {} --object-id {}(no--certificate-permissionspresent)az keyvault set-policy --name {} --object-id {} --certificate-permissions(--certificate-permissionspresent with no value)az keyvault set-policy --name {} --object-id {} --certificate-permissions(--certificate-permissions ""present with empty value)
Expected Behavior
One of these commands clears the certificate permissions for given user and vault.
Environment Summary
Windows-10-10.0.19041-SP0
Python 3.6.8
Installer: MSI
azure-cli 2.16.0 *
Extensions:
azure-devops 0.17.0
Additional Context
Looking at the available commands for az keyvault, it does not seem possible to remove access that has previously been granted with az keyvault set-policy. This seems like a critical feature because it is very easy to add many access policies with az keyvault set-policy but not easy to clean up, and thus causing manual effort to comply with compliance requirements.