-
Notifications
You must be signed in to change notification settings - Fork 3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
az keyvault create removes existing access policies #13212
Comments
@bim-msft please take a look |
this is service idempotent issue. let's feedback and see what's right solution @bim-msft |
@Cam-Borrowell Hi, according to our test, it turns out that the KeyVault service for creating operation is not idempotent. I'm not sure if service team is willing to change this behavior, or it might take a long time to change... I will let them know. Thanks for the report! For short term to unblock you quickly, using Feel free to let me know if you have any concern. |
Thank you @bim-msft . I've already implemented a workaround using |
@Cam-Borrowell Good to hear that! |
If I run the command
az keyvault create
on an existing resource, the existing access policies are removed and replaced with a new one for the Azure DevOps project that ran the script.The text was updated successfully, but these errors were encountered: