You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/storage/common/customer-managed-keys-configure-cross-tenant-existing-account.md
+23-2Lines changed: 23 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ author: tamram
7
7
8
8
ms.service: storage
9
9
ms.topic: how-to
10
-
ms.date: 10/03/2022
10
+
ms.date: 10/04/2022
11
11
ms.author: tamram
12
12
ms.reviewer: ozgun
13
13
ms.subservice: common
@@ -119,7 +119,28 @@ After you've specified the key from the key vault in the customer's tenant, the
119
119
120
120
### [PowerShell](#tab/azure-powershell)
121
121
122
-
N/A
122
+
To configure cross-tenant customer-managed keys for a new storage account in PowerShell, first install the [Az.Storage PowerShell module](https://www.powershellgallery.com/packages/Az.Storage/4.4.2-preview), version 4.4.2-preview.
123
+
124
+
Next, call [Set-AzStorageAccount](/powershell/module/az.storage/set-azstorageaccount), providing the resource ID for the user-assigned managed identity that you configured previously in the ISV's subscription, and the application (client) ID for the multi-tenant application that you configured previously in the ISV's subscription. Provide the key vault URI and key name from the customer's key vault.
125
+
126
+
Remember to replace the placeholder values in brackets with your own values and to use the variables defined in the previous examples.
Copy file name to clipboardExpand all lines: articles/storage/common/customer-managed-keys-configure-cross-tenant-new-account.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ author: tamram
7
7
8
8
ms.service: storage
9
9
ms.topic: how-to
10
-
ms.date: 10/03/2022
10
+
ms.date: 10/04/2022
11
11
ms.author: tamram
12
12
ms.reviewer: ozgun
13
13
ms.subservice: common
@@ -113,11 +113,13 @@ To configure cross-tenant customer-managed keys for a new storage account in the
113
113
114
114
To configure cross-tenant customer-managed keys for a new storage account in PowerShell, first install the [Az.Storage PowerShell module](https://www.powershellgallery.com/packages/Az.Storage/4.4.2-preview), version 4.4.2-preview.
115
115
116
-
Next, call [New-AzStorageAccount](/powershell/module/az.storage/new-azstorageaccount), providing the resource ID for the user-assigned managed identity that you configured previously in the ISV's subscription, and the application (client) ID for the multi-tenant application that you configured previously in the ISV's subscription. Remember to replace the placeholder values in brackets with your own values and to use the variables defined in the previous examples.
116
+
Next, call [New-AzStorageAccount](/powershell/module/az.storage/new-azstorageaccount), providing the resource ID for the user-assigned managed identity that you configured previously in the ISV's subscription, and the application (client) ID for the multi-tenant application that you configured previously in the ISV's subscription. Provide the key vault URI and key name from the customer's key vault.
117
+
118
+
Remember to replace the placeholder values in brackets with your own values and to use the variables defined in the previous examples.
Copy file name to clipboardExpand all lines: includes/active-directory-msi-cross-tenant-cmk-create-identities-authorize-key-vault.md
+46-34Lines changed: 46 additions & 34 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -83,25 +83,31 @@ The following steps are performed by the service provider in the service provide
83
83
84
84
#### Create a new multi-tenant application registration
85
85
86
-
Pick a name for your multi-tenant application in *Tenant1*. For example: “XTCMKDemoApp”. Note that this name is used by customers to identify the application in *Tenant2*. Note the application ID (or client ID) of the app, the object ID of the app, and also the tenant ID for the app. You'll need these values in the following steps.
86
+
Pick a name for your multi-tenant application in *Tenant1*, and create the multi-tenant application in the Azure portal.
87
+
88
+
The name that you provide for the multi-tenant application is used by the customer to identify the application in *Tenant2*. Copy the application ID (or client ID) of the app, the object ID of the app, and also the tenant ID for the app. You'll need these values in the following steps.
87
89
88
90
#### The service provider creates a user-assigned managed identity
89
91
90
-
Create a user-assigned managed identity to be used as a federated identity credential.
92
+
Sign in to the ISV's tenant, and then create a user-assigned managed identity to be used as a federated identity credential.
@@ -225,7 +231,7 @@ To create the key vault, the user's account must be assigned the **Key Vault Con
225
231
226
232
:::image type="content" source="media/active-directory-msi-cross-tenant-cmk-create-identities-authorize-key-vault/create-key-vault.png" alt-text="Screen shot showing how to create a key vault." lightbox="media/active-directory-msi-cross-tenant-cmk-create-identities-authorize-key-vault/create-key-vault.png" border="true":::
227
233
228
-
Take note of the **Vault name** and **Vault URI**. Applications that access your key vault must use this URI.
234
+
Take note of the key vault name and URI Applications that access your key vault must use this URI.
229
235
230
236
For more information, see [Quickstart - Create an Azure Key Vault with the Azure portal](../articles/key-vault/general/quick-create-portal.md).
231
237
@@ -246,9 +252,7 @@ To create the encryption key, the user's account must be assigned the **Key Vaul
246
252
247
253
1. On the Key Vault properties page, select **Keys**.
248
254
1. Select **Generate/Import**.
249
-
1. On the **Create a key** screen choose the following values. Leave the other values to their defaults.
250
-
- Options: Generate
251
-
- Name: mycmkkey
255
+
1. On the **Create a key** screen, specify a name for the key. Leave the other values to their defaults.
252
256
1. Select **Create**.
253
257
1. Copy the key URI.
254
258
@@ -278,17 +282,24 @@ Once you receive the application ID of the service provider's multi-tenant appli
278
282
Execute the following commands in the tenant where you plan to create the key vault.
To create the encryption key, the user's account must be assigned the **Key Vault Crypto Officer** role or another role that permits creation of a key.
Now you can configure customer-managed keys with the key vault URI and key.
@@ -388,7 +400,7 @@ az role assignment create --role "Key Vault Crypto Officer" --scope /subscriptio
388
400
To create the encryption key, the user's account must be assigned the **Key Vault Crypto Officer** role or another role that permits creation of a key.
389
401
390
402
```azurecli
391
-
az keyvault key create --name mastercmkkey --vault-name $vaultName
403
+
az keyvault key create --name > --vault-name $vaultName
392
404
```
393
405
394
406
#### The customer grants the service provider application access to the key vault
0 commit comments