You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/ai-foundry/concepts/encryption-keys-portal.md
+29-3Lines changed: 29 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -123,7 +123,7 @@ Customer-managed key encryption is configured via Azure portal (or alternatively
123
123
124
124
## Encryption Key Rotation
125
125
126
-
If you're using [customer-managed key encryption](../concepts/encryption-keys-portal.md), Azure AI Foundry allows you to rotate the encryption key used to protect your data. This applies to data stored in Microsoft-managed infrastructure, encrypted using your Azure Key Vault key.
126
+
You can rotate a customer-managed key in Key Vault according to your compliance policies. When the key is rotated, you must update the Azure AI Foundry resource to use the new key URI. Rotating the key doesn't trigger re-encryption of data in the resource.
127
127
128
128
Rotation Limitations
129
129
@@ -141,20 +141,46 @@ Rotation Limitations
141
141
142
142
How to Rotate Encryption Keys
143
143
144
-
* In your Azure Key Vault, create or identify the new key you want to use for encryption.
144
+
* In your Azure Key Vault, create or identify the new key you want to use for new data encryption.
145
145
146
146
* From Azure Portal or template options, update the resource configuration to reference the new key within the same Key Vault.
147
147
148
-
* Your resource will take a few minutes to wrap data using your new encryption key. During this period, certain service operations are available.
148
+
* Your resource will take a few minutes to configure wrapping data using your new encryption key. During this period, certain service operations are available.
149
149
150
150
* The service will begin using the new key for encryption of newly stored data. Existing data remains encrypted with the previous key unless reprocessed.
151
151
152
+
## Revoke a customer-managed key
153
+
154
+
You can revoke a customer-managed encryption key by changing the access policy, by changing the permissions on the key vault, or by deleting the key.
155
+
156
+
To change the access policy of the managed identity that your registry uses, run the [az-keyvault-delete-policy](/cli/azure/keyvault#az-keyvault-delete-policy) command:
157
+
158
+
```azurecli
159
+
az keyvault delete-policy \
160
+
--resource-group <resource-group-name> \
161
+
--name <key-vault-name> \
162
+
--key_id <key-vault-key-id>
163
+
```
164
+
165
+
To delete the individual versions of a key, run the [az-keyvault-key-delete](/cli/azure/keyvault/key#az-keyvault-key-delete) command. This operation requires the *keys/delete* permission.
166
+
167
+
```azurecli
168
+
az keyvault key delete \
169
+
--vault-name <key-vault-name> \
170
+
--id <key-ID>
171
+
```
172
+
173
+
> [!IMPORTANT]
174
+
> Revoking access to an active customer-managed key while CMK is still enabled will prevent downloading of training data and results files, fine-tuning new models, and deploying fine-tuned models. However, previously deployed fine-tuned models will continue to operate and serve traffic until those deployments are deleted.
175
+
152
176
## Additional Azure cost when using customer-managed keys
153
177
154
178
When using customer-managed keys, generally your data is stored using document-level encryption in Microsoft-managed storage components. To ensure your data can be stored in isolation and encrypted using your keys, certain backend Azure services used by Azure AI Foundry must be hosted in a dedicated manner per AI Foundry resource in combination with CMK encryption. Additional charges apply when using CMK to accomodate this dedicated hosting model. These charges will show in Azure Cost management as sub line items under your Azure AI Foundry resource.
155
179
156
180
## Limitations
157
181
182
+
* AI Foundry resources may be updated from Microsoft-managed keys to customer-managed keys, but not from customer-managed keys to Microsoft-managed keys.
183
+
* AI Foundry hub resources cannot be updated from Microsoft-managed keys to customer-managed keys, or vice versa, post-creation.
158
184
* The customer-managed key for encryption can only be updated to keys in the same Azure Key Vault instance.
159
185
* Azure OpenAI assistants service does not support CMK encryption.
160
186
* While project sub-resources exist, you can't switch AI Foundry resources from Customer-managed keys to Microsoft managed keys.
0 commit comments