Skip to content

Commit 0b80d66

Browse files
committed
Update configure-customer-managed-keys.md
1 parent 5c44b71 commit 0b80d66

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

articles/azure-vmware/configure-customer-managed-keys.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -35,14 +35,14 @@ The following diagram shows how Azure VMware Solution uses Azure Active Director
3535

3636
Before you begin to enable customer-managed key (CMK) functionality, ensure the following listed requirements are met:
3737

38-
1. You'll need an Azure Key Vault to use CMK functionality. If you don't have an Azure Key Vault, you can create one using [Quickstart: Create a key vault using the Azure portal](https://docs.microsoft.com/azure/key-vault/general/quick-create-portal).
39-
2. If you enabled restricted access to key vault, you'll need to allow Microsoft Trusted Services to bypass the Azure Key Vault firewall. Go to [Configure Azure Key Vault networking settings](https://docs.microsoft.com/azure/key-vault/general/how-to-azure-key-vault-network-security?tabs=azure-portal) to learn more.
38+
- You'll need an Azure Key Vault to use CMK functionality. If you don't have an Azure Key Vault, you can create one using [Quickstart: Create a key vault using the Azure portal](https://docs.microsoft.com/azure/key-vault/general/quick-create-portal).
39+
- If you enabled restricted access to key vault, you'll need to allow Microsoft Trusted Services to bypass the Azure Key Vault firewall. Go to [Configure Azure Key Vault networking settings](https://docs.microsoft.com/azure/key-vault/general/how-to-azure-key-vault-network-security?tabs=azure-portal) to learn more.
4040
>[!NOTE]
4141
>After firewall rules are in effect, users can only perform Key Vault [data plane](https://docs.microsoft.com/azure/key-vault/general/security-features#privileged-access) operations when their requests originate from allowed VMs or IPv4 address ranges. This also applies to accessing key vault from the Azure portal. This also affects the key vault Picker by Azure VMware Solution. Users may be able to see a list of key vaults, but not list keys, if firewall rules prevent their client machine or user does not have list permission in key vault.
4242
43-
1. Enable **System Assigned identity** on your Azure VMware Solution private cloud if you didn't enable it during software-defined data center (SDDC) provisioning.
43+
- Enable **System Assigned identity** on your Azure VMware Solution private cloud if you didn't enable it during software-defined data center (SDDC) provisioning.
4444

45-
# [Azure Portal](#tab/azure-portal)
45+
# [Portal](#tab/azure-portal)
4646

4747
Use the following steps to enable System Assigned identity:
4848

@@ -72,9 +72,9 @@ Before you begin to enable customer-managed key (CMK) functionality, ensure the
7272
```
7373
---
7474
75-
4. Configure the key vault access policy to grant permissions to the managed identity. It will be used to authorize access to the key vault.
75+
- Configure the key vault access policy to grant permissions to the managed identity. It will be used to authorize access to the key vault.
7676
77-
# [Azure Portal](#tab/azure-portal)
77+
# [Portal](#tab/azure-portal)
7878
7979
1. Sign in to Azure portal.
8080
1. Navigate to **Key vaults** and locate the key vault you want to use.
@@ -129,11 +129,11 @@ System-assigned identity is restricted to one per resource and is tied to the li
129129
>[!IMPORTANT]
130130
> Ensure that key vault is in the same region as the Azure VMware Solution private cloud.
131131
132-
# [Azure Portal](#tab/azure-portal)
132+
# [Portal](#tab/azure-portal)
133133
134134
Navigate to your **Azure Key Vault** and provide access to the SDDC on Azure Key Vault using the Principal ID captured in the **Enable MSI** tab.
135135
136-
1. From your Azure VMware Solution private cloud, under **Manage**, select **Encryption**, then **Customer-managed keys (CMK)**.
136+
1. From your Azure VMware Solution private cloud, under **Manage**, select **Encryption**, then select **Customer-managed keys (CMK)**.
137137
1. CMK provides two options for **Key Selection** from Azure Key Vault.
138138
139139
**Option 1**
@@ -172,7 +172,7 @@ az vmware private-cloud add-cmk-encryption --private-cloud <private_cloud_name>
172172

173173
**Option 2**
174174

175-
Supply key version as argument to use customer-managed keys with a specific key version, same as mentioned above in Azure Portal option 2. The following example shows the customer providing a specific key version.
175+
Supply key version as argument to use customer-managed keys with a specific key version, same as mentioned above in Azure portal option 2. The following example shows the customer providing a specific key version.
176176

177177
```azurecli-interactive
178178
az vmware private-cloud add-cmk-encryption --private-cloud <private_cloud_name> --resource-group <resource_group_name> --enc-kv-url $keyVaultUrl --enc-kv-key-name --enc-kv-key-version <keyvault_key_keyVersion>

0 commit comments

Comments
 (0)