I have an Azure app service running in context of a managed identity. I want my app to be able to read a certificate from a key vault, using CertificateClient.DownloadCertificateAsync
.
I need to grant my managed identity some privileges in order to do that (otherwise I just get an exception).
"Reader" or "Key Vault Secrets User" is not enough to let it read certificates.
So far, the minimal role (RBAC) I have found that lets my managed identity read those certificates is "Key Vault Certificates Officer". I am a bit sad to grant that role to the managed identity, because as far as I understand, that role also includes some write-permissions which I am not sure the managed identity ought to have.
Can I do better? What is the minimal way to grant a managed identity permission to read a certificate from a key vault?