Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Microsoft SC-300 Exam - Topic 4 Question 122 Discussion

Actual exam question for Microsoft's SC-300 exam
Question #: 122
Topic #: 4
[All SC-300 Questions]

You have an Azure subscription that contains a user named User1 and an Azure Key Vault named Vault1.

You need to ensure that User1 can read the metadata of certificates, keys, and secrets stored in Vault1. The solution must follow the principle of least privilege.

Which role should you assign to User1?

Show Suggested Answer Hide Answer
Suggested Answer: C

Comprehensive and Detailed In-Depth

Let's break this down step by step based on Azure Key Vault roles, permissions, and the principle of least privilege, as outlined in Microsoft Identity and Access Administrator documentation.

Understanding Azure Key Vault and the Requirement:

Azure Key Vault is a service that securely stores and manages cryptographic keys, secrets, and certificates. It uses role-based access control (RBAC) to manage permissions for users, groups, and applications.

The question requires that User1 canread the metadataof certificates, keys, and secrets in Vault1. In Azure Key Vault, 'metadata' refers to the properties of these objects (e.g., name, creation date, expiration date), not the actual content (e.g., the secret value, key value, or certificate private key).

The solution must follow theprinciple of least privilege, meaning User1 should be granted the minimum permissions necessary to perform the task, without access to unnecessary actions (e.g., modifying or deleting objects).

Azure Key Vault RBAC Roles and Permissions:

Azure Key Vault supports built-in RBAC roles that define specific permissions for managing keys, secrets, and certificates. Let's examine each role in the options:

Key Vault Crypto User:

This role allows a user to perform cryptographic operations using keys (e.g., encrypt, decrypt, sign, verify) and to read key metadata.

Permissions include: Microsoft.KeyVault/vaults/keys/read (read key metadata) and cryptographic operations like encrypt, decrypt, etc.

However, this role does not grant permissions to read metadata for secrets or certificates, and it includes cryptographic operation permissions, which are not needed for the task.

Key Vault Crypto Officer:

This role is designed for managing keys and performing cryptographic operations. It includes permissions to create, delete, update, and read keys, as well as perform cryptographic operations.

Permissions include: Microsoft.KeyVault/vaults/keys/* (full control over keys).

This role does not grant access to secrets or certificates and provides more permissions than needed (e.g., create, delete), violating the principle of least privilege.

Key Vault Reader:

This role provides read-only access to the metadata of all objects in the Key Vault (keys, secrets, and certificates).

Permissions include: Microsoft.KeyVault/vaults/read (read vault properties) and Microsoft.KeyVault/vaults/*/read (read metadata for keys, secrets, and certificates).

Importantly, this role does not allow access to the actual content of the objects (e.g., the secret value, key value, or certificate private key), only the metadata. It also does not allow write operations (e.g., create, update, delete).

This aligns perfectly with the requirement to 'read the metadata' and follows the principle of least privilege.

Key Vault Secrets User:

This role allows a user to read the content of secrets (not just metadata) and perform operations like getting the secret value.

Permissions include: Microsoft.KeyVault/vaults/secrets/get (read secret values) and Microsoft.KeyVault/vaults/secrets/read (read secret metadata).

This role does not grant access to keys or certificates, and it provides more access than needed (reading the secret value, not just metadata), violating the principle of least privilege.

Applying the Principle of Least Privilege:

The task requires User1 to read the metadata of certificates, keys, and secrets, but not to access their content or perform any write operations.

Key Vault Readeris the most appropriate role because:

It grants read-only access to the metadata of all objects (keys, secrets, certificates).

It does not allow access to the content of the objects (e.g., secret values), which is not required.

It does not allow write operations (e.g., create, delete), adhering to the principle of least privilege.

The other roles either provide too much access (e.g., Key Vault Crypto Officer, Key Vault Secrets User) or do not cover all required objects (e.g., Key Vault Crypto User, Key Vault Secrets User).

Analysis of the Options:

A . Key Vault Crypto User:

Incorrect. This role only allows reading key metadata and performing cryptographic operations, but it does not provide access to secrets or certificates metadata. It also grants unnecessary cryptographic permissions.

B . Key Vault Crypto Officer:

Incorrect. This role provides full control over keys, which is far more than needed, and does not grant access to secrets or certificates metadata.

C . Key Vault Reader:

Correct. This role provides read-only access to the metadata of keys, secrets, and certificates, exactly matching the requirement while following the principle of least privilege.

D . Key Vault Secrets User:

Incorrect. This role allows reading secret values (not just metadata) and does not provide access to keys or certificates metadata. It grants more access than needed.

Additional Considerations:

If the question had asked for User1 to read the content of secrets (not just metadata), the Key Vault Secrets User role might be considered, but it still wouldn't cover keys and certificates.

Custom RBAC roles could be created to fine-tune permissions, but the question asks for a built-in role, and Key Vault Reader is the best fit.

The question does not specify whether User1 needs to perform other actions (e.g., cryptographic operations, managing the vault). If additional permissions were needed, a combination of roles or a custom role might be required, but the principle of least privilege guides us to the minimal role.

Conclusion:To ensure User1 can read the metadata of certificates, keys, and secrets in Vault1 while following the principle of least privilege, theKey Vault Readerrole should be assigned. This role provides the exact permissions needed without granting unnecessary access. Therefore, the correct answer isC.


Azure Key Vault documentation: 'Azure Key Vault RBAC roles' (Microsoft Learn:https://learn.microsoft.com/en-us/azure/key-vault/general/rbac-guide)

Azure Key Vault documentation: 'Secure access to a key vault' (Microsoft Learn:https://learn.microsoft.com/en-us/azure/key-vault/general/secure-your-key-vault)

Microsoft Identity and Access Administrator (SC-300) exam study guide, which covers Azure Key Vault access control and the principle of least privilege.

Contribute your Thoughts:

0/2000 characters
Diane
2 days ago
Surprised that people think D is a good option. Seems off to me!
upvoted 0 times
...
Jose
7 days ago
Wait, isn't B) Key Vault Crypto Officer too much access?
upvoted 0 times
...
Dana
25 days ago
I think D) Key Vault Secrets User could work too.
upvoted 0 times
...
Shonda
1 month ago
C) Key Vault Reader is the right choice!
upvoted 0 times
...
Donte
1 month ago
I wonder if User1 is actually a supervillain in disguise. C) is the way to go, but keep an eye on them just in case!
upvoted 0 times
...
Fanny
1 month ago
Haha, I bet User1 is going to try to hack the vault and steal all the secrets. C) is the safest bet, though.
upvoted 0 times
...
Reta
2 months ago
A) Key Vault Crypto User and B) Key Vault Crypto Officer are overkill. We just need to read the metadata, so C) is the way to go.
upvoted 0 times
...
Xochitl
2 months ago
D) Key Vault Secrets User is a bit too broad. We only need to grant the minimum required access, so C) is the better option.
upvoted 0 times
...
Bong
2 months ago
I feel like the Key Vault Crypto User could be relevant too, but it seems more about using keys rather than just reading metadata.
upvoted 0 times
...
Devon
2 months ago
I practiced a similar question, and I believe the Key Vault Reader role is the best fit for reading metadata without extra permissions.
upvoted 0 times
...
Therese
2 months ago
I'm not entirely sure, but I remember something about the Key Vault Secrets User role being more focused on secrets specifically.
upvoted 0 times
...
Flo
2 months ago
The Key Vault Reader role sounds like the best fit here. It will allow User1 to view the metadata without granting any additional permissions that aren't needed.
upvoted 0 times
...
Tricia
3 months ago
I'm leaning towards option C, Key Vault Reader. That seems like it would give User1 the minimum access required to read the metadata, which is what the question is asking for.
upvoted 0 times
...
Floyd
3 months ago
Okay, the question is asking to follow the principle of least privilege, so I'm thinking the Key Vault Reader role is the way to go. That will let User1 view the metadata without any additional crypto or secret management permissions.
upvoted 0 times
...
Karina
3 months ago
C) Key Vault Reader seems like the obvious choice here. It allows User1 to read the metadata without granting any additional permissions.
upvoted 0 times
...
Loreta
3 months ago
I think it might be the Key Vault Reader role since it sounds like it would allow access to metadata.
upvoted 0 times
...
Maryanne
4 months ago
Totally agree with C! It's all about least privilege.
upvoted 0 times
...
Angelyn
4 months ago
I'm a bit unsure here. Do we need to give User1 any permissions to actually use the keys and secrets, or just read the metadata? I'll have to double-check the role definitions.
upvoted 0 times
...
Edward
4 months ago
Hmm, this seems straightforward. I think the Key Vault Reader role would be the best choice to give User1 the least privilege needed to read the metadata.
upvoted 0 times
Solange
3 months ago
I agree, Key Vault Reader sounds right for this.
upvoted 0 times
...
Kristine
4 months ago
Key Vault Reader is perfect for metadata access.
upvoted 0 times
...
...

Save Cancel