You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-vmware/configure-customer-managed-keys.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,14 +35,14 @@ The following diagram shows how Azure VMware Solution uses Azure Active Director
35
35
36
36
Before you begin to enable customer-managed key (CMK) functionality, ensure the following listed requirements are met:
37
37
38
-
1. You'll need an Azure Key Vault to use CMK functionality. If you don't have an Azure Key Vault, you can create one using [Quickstart: Create a key vault using the Azure portal](https://docs.microsoft.com/azure/key-vault/general/quick-create-portal).
39
-
2. If you enabled restricted access to key vault, you'll need to allow Microsoft Trusted Services to bypass the Azure Key Vault firewall. Go to [Configure Azure Key Vault networking settings](https://docs.microsoft.com/azure/key-vault/general/how-to-azure-key-vault-network-security?tabs=azure-portal) to learn more.
38
+
- You'll need an Azure Key Vault to use CMK functionality. If you don't have an Azure Key Vault, you can create one using [Quickstart: Create a key vault using the Azure portal](https://docs.microsoft.com/azure/key-vault/general/quick-create-portal).
39
+
- If you enabled restricted access to key vault, you'll need to allow Microsoft Trusted Services to bypass the Azure Key Vault firewall. Go to [Configure Azure Key Vault networking settings](https://docs.microsoft.com/azure/key-vault/general/how-to-azure-key-vault-network-security?tabs=azure-portal) to learn more.
40
40
>[!NOTE]
41
41
>After firewall rules are in effect, users can only perform Key Vault [data plane](https://docs.microsoft.com/azure/key-vault/general/security-features#privileged-access) operations when their requests originate from allowed VMs or IPv4 address ranges. This also applies to accessing key vault from the Azure portal. This also affects the key vault Picker by Azure VMware Solution. Users may be able to see a list of key vaults, but not list keys, if firewall rules prevent their client machine or user does not have list permission in key vault.
42
42
43
-
1. Enable **System Assigned identity** on your Azure VMware Solution private cloud if you didn't enable it during software-defined data center (SDDC) provisioning.
43
+
- Enable **System Assigned identity** on your Azure VMware Solution private cloud if you didn't enable it during software-defined data center (SDDC) provisioning.
44
44
45
-
# [Azure Portal](#tab/azure-portal)
45
+
# [Portal](#tab/azure-portal)
46
46
47
47
Use the following steps to enable System Assigned identity:
48
48
@@ -72,9 +72,9 @@ Before you begin to enable customer-managed key (CMK) functionality, ensure the
72
72
```
73
73
---
74
74
75
-
4. Configure the key vault access policy to grant permissions to the managed identity. It will be used to authorize access to the key vault.
75
+
- Configure the key vault access policy to grant permissions to the managed identity. It will be used to authorize access to the key vault.
76
76
77
-
# [Azure Portal](#tab/azure-portal)
77
+
# [Portal](#tab/azure-portal)
78
78
79
79
1. Sign in to Azure portal.
80
80
1. Navigate to **Key vaults** and locate the key vault you want to use.
@@ -129,11 +129,11 @@ System-assigned identity is restricted to one per resource and is tied to the li
129
129
>[!IMPORTANT]
130
130
> Ensure that key vault is in the same region as the Azure VMware Solution private cloud.
131
131
132
-
# [Azure Portal](#tab/azure-portal)
132
+
# [Portal](#tab/azure-portal)
133
133
134
134
Navigate to your **Azure Key Vault** and provide access to the SDDC on Azure Key Vault using the Principal ID captured in the **Enable MSI** tab.
135
135
136
-
1. From your Azure VMware Solution private cloud, under **Manage**, select **Encryption**, then **Customer-managed keys (CMK)**.
136
+
1. From your Azure VMware Solution private cloud, under **Manage**, select **Encryption**, then select **Customer-managed keys (CMK)**.
137
137
1. CMK provides two options for **Key Selection** from Azure Key Vault.
138
138
139
139
**Option 1**
@@ -172,7 +172,7 @@ az vmware private-cloud add-cmk-encryption --private-cloud <private_cloud_name>
172
172
173
173
**Option 2**
174
174
175
-
Supply key version as argument to use customer-managed keys with a specific key version, same as mentioned above in Azure Portal option 2. The following example shows the customer providing a specific key version.
175
+
Supply key version as argument to use customer-managed keys with a specific key version, same as mentioned above in Azure portal option 2. The following example shows the customer providing a specific key version.
0 commit comments