How to grant access to secrets in an Azure Key Vault

Updated on August 25, 2025

One you have established an Azure Key Vault to store your secrets (such as a shared password or API key), you need to grant access to the vault so the users can fetch the secret as needed. Under the Azure RBAC model (role-based access control), you assign a role to a person who needs access. The role defines the permissions granted to the person.

Prerequisites

These instructions assume you have already created a key vault and now you need to grant someone access to the vault. If you still need to create the vault, see How to create an Azure Key Vault.

Instructions

  1. Go to your key vault on Azure

    From the top search bar, you can search for your vault by name, or search for “key vaults” and navigate to your vault. 

  2. Click Access Control (IAM) on the left menu

  3. Click +Add and then Add Role Assignment from the menu

  4. Click role you want to assign to the user (typically Key Vault Secrets User)

    To view secrets (read-only), click Key Vault Secrets User. To create secrets, you need Key Vault Secrets Officer.

    On a typical team, give the lead the Key Vaults Secrets Officer role. Give the team members Key Vaults Secrets User. This means the lead person can create the secrets, and the rest of the team has read-only access to read them.

  5. Click Next

  6. Click + Select members

    A popup window will appear for you to select one or more people to receive the role.

  7. In the popup, select a person and click Select

  8. Optionally write a description

    A description of why you are assigning this role can be helpful for auditing purposes.

  9. Click Review + assign

  10. Review and click Review + assign again

Reference

See also

License

Licensed under CC BY 4.0

You are free to share and adapt this content for any purpose as long as you give appropriate credit in a reasonable manner.

No affiliate links

We do not participate in affiliate marketing, and we are not paid to mention products.

Leave a Reply

Your email address will not be published. Required fields are marked *