Describe the problem/error/question
When hooking up Azure Key Vault, we are observing that the connected service principal must have “Key Vault Secrets User” role scoped to the entire key vault. RBAC controls scoping the service principal to “Key Vault Reader” on the vault itself but only “Key Vault Secrets User” to specific secrets results in errors upon reloading secrets. Additionally, even if the service principal has “Key Vault Secrets User” role scoped to the entire vault, one disabled secret results in the same observed error.
The only successful outcome is to scope the service principal to either:
a) “Key Vault Reader” scoped to the key vault and “Key Vault Secrets User” scoped to each secret.
b) “Key Vault Secrets User” scoped to the entire key vault.
This sounds similar to Azure Vault stopped working with error 400 - #6 by jbenway
What is the error message (if any)?
Error
Reload failed
Information on your n8n setup
- n8n version: 2.14.2
- Running n8n via n8n cloud