π§ Azure Key Vault Role Based Access Control is not enabled - prod.logic.yamlπ’
- Contextual name: π§ prod.logic.yamlπ’
- ID:
/ce/ca/azure/key-vault/role-based-access-control/prod.logic.yaml - Tags:
- π’ Logic test success
- π’ Logic with extracts
- π’ Logic with test data
Usesβ
- π Azure Key Vault
- π Azure Key Vault - object.extracts.yaml
- π§ͺ test-data.json
Test Results π’β
Generated at: 2026-02-10T22:33:29.434657972Z Open
| Result | Id | Condition Index | Condition Text | Runtime Error |
|---|---|---|---|---|
| π’ | test1 | βοΈ 99 | βοΈ isDisappeared(CA10__disappearanceTime__c) | βοΈ null |
| π’ | test2 | βοΈ 199 | βοΈ extract('CA10__rbacAuthorization__c') == 'Disabled' | βοΈ null |
| π’ | test3 | βοΈ 299 | βοΈ extract('CA10__rbacAuthorization__c') == 'Enabled' | βοΈ null |
Generation Bundleβ
| File | MD5 | |
|---|---|---|
| Open | /ce/ca/azure/key-vault/role-based-access-control/policy.yaml | D0CAC5FC210041FB7AAB3BBEC4B501CC |
| Open | /ce/ca/azure/key-vault/role-based-access-control/prod.logic.yaml | A086328420F28860D65447CBCF507E97 |
| Open | /ce/ca/azure/key-vault/role-based-access-control/test-data.json | 77CAC2CEF593C8012B7436C9F1D385A8 |
| Open | /types/CA10__CaAzureKeyVault__c/object.extracts.yaml | 120E8A73DCC969A90893ADC71C57D3FD |
Available Commandsβ
repo-manager policies generate FULL /ce/ca/azure/key-vault/role-based-access-control/prod.logic.yaml
repo-manager policies generate DEBUG /ce/ca/azure/key-vault/role-based-access-control/prod.logic.yaml
repo-manager policies generate CAPTURE_TEST_DATA /ce/ca/azure/key-vault/role-based-access-control/prod.logic.yaml
repo-manager policies generate TESTS /ce/ca/azure/key-vault/role-based-access-control/prod.logic.yaml
# Execute tests
repo-manager policies test /ce/ca/azure/key-vault/role-based-access-control/prod.logic.yaml
Contentβ
---
inputType: "CA10__CaAzureKeyVault__c"
importExtracts:
- file: "/types/CA10__CaAzureKeyVault__c/object.extracts.yaml"
testData:
- file: "test-data.json"
conditions:
- status: "INCOMPLIANT"
currentStateMessage: "Azure role-based access control (RBAC) is disabled."
remediationMessage: "Enable Azure RBAC for the Key Vault."
check:
IS_EQUAL:
left:
EXTRACT: "CA10__rbacAuthorization__c"
right:
TEXT: "Disabled"
- status: "COMPLIANT"
currentStateMessage: "Azure role-based access control (RBAC) is enabled."
check:
IS_EQUAL:
left:
EXTRACT: "CA10__rbacAuthorization__c"
right:
TEXT: "Enabled"
otherwise:
status: "UNDETERMINED"
currentStateMessage: "Unexpected value in the field."