I'm using the following setup described here. https://learn.microsoft.com/en-us/azure/api-management/api-management-howto-properties?WT.mc_id=Portal-fx&tabs=azure-cli
I setup APIM with a system managed identity, then go to KV, grant Key Vault Secrets and Certificate Management to the APIM identity, but when I try to crate custom domain and certificates via terraform to APIM I got the following error:
Error: creating/updating Custom Domain: xxx performing CreateOrUpdate: xx unexpected status 400 with error: InvalidOperation: Failed to access KeyVault Secret xxx using Managed Service Identity (http://aka.ms/apimmsi) of Api Management service. Check if Managed Identity of Type: SystemAssigned, ClientId: xxx and ObjectId: xxx has GET permissions on secrets in the KeyVault Access Policies.
Here you're trying to set up Azure API Management (APIM) with a system managed identity and then use this identity to access secrets in Azure Key Vault for the purpose of configuring a custom domain and certificates via Terraform. The error you're encountering indicates a permissions issue with the Managed Service Identity (MSI) accessing the Key Vault.
The error message you're receiving suggests that the Managed Service Identity associated with your Azure API Management service does not have the required permissions to access secrets in the Azure Key Vault.
Make sure your SP or User permissions are in-line with your provision requirement. As you required to provision keyvault and access its secrets we need keyvault adminstrator, secret officer and contributor role for you identity.
I tried a demo version of configuration with necesary permissions Where i can successfully provision the requirement.
My terraform configuration:
Output:
Now push an SSL certificate to the key vault and continue with the configuration that follows.
This configuration will let you access the certification as your SP has all the relevant permissions as mentioned above.