简体   繁体   English

Azure 多订阅 Key Vault 访问策略

[英]Azure multiple subscriptions key vault access policies

I am trying to export keyvault access policies from multiple azure subscriptions to csv.我正在尝试将密钥库访问策略从多个 azure 订阅导出到 csv。 Preferably pulling those vault names & sub ids from an input csv and looping through it.最好从输入 csv 中提取这些保险库名称和子 ID 并循环遍历它。 Searching around I found solutions but they all use hardcoded vault names.. I hope this makes sense.. Will appreciate any help.四处搜索我找到了解决方案,但它们都使用硬编码的保险库名称.. 我希望这是有道理的.. 将不胜感激。 Thank you.谢谢你。

You could try the script below, it works fine on my side.你可以试试下面的脚本,它在我这边工作正常。

$subs = Get-AzureRmSubscription
foreach($sub in $subs){
    Set-AzureRmContext -Subscription $sub.Id -Tenant $sub.TenantId
    $vaults = Get-AzureRmKeyVault
    foreach($vault in $vaults){
        $policies = (Get-AzureRmKeyVault -ResourceGroupName $vault.ResourceGroupName -VaultName $vault.VaultName).AccessPolicies
        $policies | select DisplayName, PermissionsToCertificatesStr, PermissionsToKeysStr, PermissionsToSecretsStr | Export-Csv -Path C:\Users\joyw\Desktop\policies.csv -Append -NoTypeInformation
    }
}

The policies.csv file will be like: policies.csv文件将类似于:

政策.csv

Update :更新

If you want to include the keyvault name, try the script below.如果要包含密钥库名称,请尝试以下脚本。

$subs = Get-AzureRmSubscription
foreach($sub in $subs){
    Set-AzureRmContext -Subscription $sub.Id -Tenant $sub.TenantId
    $vaults = Get-AzureRmKeyVault
    foreach($vault in $vaults){
        $policies = (Get-AzureRmKeyVault -ResourceGroupName $vault.ResourceGroupName -VaultName $vault.VaultName).AccessPolicies
        foreach($policy in $policies){
        $obj = [PSCustomObject]@{
            KeyVaultName = $vault.VaultName
            DisplayName = $policy.DisplayName
            PermissionsToCertificatesStr = $policy.PermissionsToCertificatesStr
            PermissionsToKeysStr = $policy.PermissionsToKeysStr
            PermissionsToSecretsStr = $policy.PermissionsToSecretsStr
            }
        $obj |  Export-Csv -Path C:\Users\joyw\Desktop\policies1.csv -Append -NoTypeInformation
       }
    }
}

在此处输入图片说明

声明:本站的技术帖子网页,遵循CC BY-SA 4.0协议,如果您需要转载,请注明本站网址或者原文地址。任何问题请咨询:yoyou2525@163.com.

相关问题 用于加密 vm azure 备份的密钥库访问策略 - Terraform - key Vault access policies for encrypted vm azure backup - Terraform Azure ARM模板-检查现有的密钥保管库访问策略 - Azure ARM template - check for existing Key Vault access policies Azure密钥保管库如何识别访问策略中分配的不同身份 - Azure key vault how to identify different identities assigned in access policies 如何使用蓝图将访问策略分配给 Azure Key Vault - How to assign Access Policies to an Azure Key Vault using Blueprints 运行时 Azure Key Vault 访问策略出现问题 Terraform Apply - Problems with Azure Key Vault Access Policies when running Terraform Apply 具有ARM和访问策略的关键保管库 - Key Vault with ARM and Access policies 无法将 Microsoft.Azure.Cdn 服务主体添加到 Key Vault 访问策略 - Can't add Microsoft.Azure.Cdn service principal to Key Vault access policies RequestFailedException/403 使用基于角色的访问策略访问 Azure Key Vault 时出现禁止错误 - RequestFailedException/403 Forbidden errors accessing Azure Key Vault with role based access policies Azure ARM 模板添加部署者 object id 到密钥保管库访问策略 - Azure ARM template add deployer object id to key vault access policies 从 azure 密钥库作为数据源访问多个密钥 - access multiple key from azure key vault as data source
 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM