Skip to content

Commit 17215bd

Browse files
committed
edit
1 parent 77dc07f commit 17215bd

File tree

1 file changed

+23
-19
lines changed

1 file changed

+23
-19
lines changed

articles/operational-excellence/relocation-key-vault.md

Lines changed: 23 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -25,18 +25,16 @@ Instead of relocation, you need to:
2525

2626
## Prerequisites
2727

28-
- Verify that your Azure subscription allows you to create Key Vaults in the target region. To enable the required quota, contact support.
29-
- Create a dependency map with all the Azure services used by the Key Vault. For the services that are in scope of the relocation, you must elect the appropriate relocation strategy.
30-
31-
- Depending on your Key Vault design, the following dependent resources might need to be deployed and configured in the target region:
32-
- [Public IP](/azure/virtual-network/move-across-regions-publicip-portal)
33-
- [Azure Private Link](./relocation-private-link.md)
34-
- [Virtual Network](./relocation-virtual-network.md)
35-
- [Service Endpoints](/azure/virtual-network/scripts/virtual-network-powershell-sample-peer-two-virtual-networks)
36-
- Key Vault configurations to consider:
37-
- Access Policies and Network configuration settings need to be re-configured in the new Key Vault.
38-
- Soft delete and purge protection need to be re-configured in the new key vault.
39-
- Autorotation settings need to be re-configured.
28+
- Verify that your Azure subscription allows you to create key vaults in the target region.
29+
30+
- Create a dependency map with all the Azure services used by the Key Vault. For the services that are in scope of the relocation, you must choose the appropriate relocation strategy.
31+
32+
- Depending on your Key Vault design, you may need to deploy and configure the [Virtual Network](./relocation-virtual-network.md) in the target region.
33+
34+
- Document and plan to re-configure in the Key Vault in the target region:
35+
- Access Policies and Network configuration settings.
36+
- Soft delete and purge protection.
37+
- Autorotation settings.
4038

4139
## Consideration for Service Endpoints
4240

@@ -337,21 +335,27 @@ Deploy the template to create a new key vault in the target region.
337335
New-AzResourceGroupDeployment -ResourceGroupName $resourceGroupName -TemplateUri "<name of your local template file>"
338336
```
339337

338+
3. Access Policies and Network configuration settings (private endpoints) need to be re-configured in the new Key Vault. Soft delete and purge protection need to be re-configured in the new key vault and as the _Autorotation settings_.
340339
---
341340

342-
3. Access Policies and Network configuration settings (private endpoints) need to be re-configured in the new Key Vault. Soft delete and purge protection need to be re-configured in the new key vault and as the _Autorotation settings_.
343341

344342
> [!TIP]
345343
> If you receive an error which states that the XML specified is not syntactically valid, compare the JSON in your template with the schemas described in the Azure Resource Manager documentation.
346344
347345
### Redeploy with data migration
348346

349-
> Note: In case of moving an Azure Key Vault across regions but within same geography, a backup and restore option for secrets, keys and certificates is recommended. Ref – Backup and Restore Option. The creation of the Key Vault instance and the mapping to target dependent resources still remains the same as per the previous approach.
350-
351-
1. Follow steps in the described under Redploy.
352-
2. For [secrets](/azure/key-vault/secrets/about-secrets) read the value in the source key vault and recreate the secret in the target key vault and set the value.
353-
3. For [certificates](/azure/key-vault/certificates/about-certificates) export the certificate into a PFX file and import the PFX file into the target key vault. In case you cannot export the private key (exportable is not set) you have to generate certificate a new certificate and import it into the target key vault.
354-
4. [keys](/azure/key-vault/keys/about-keys) should be regenerate with the relocation of the associated Azure service.
347+
>[!IMPORTANT]
348+
>If you plan to move a Key Vault across regions but within the same geography, it's recommended that you do a [backup and restore for secrets, keys and certificates](/azure/key-vault/general/backup) is recommended.
349+
350+
1. Follow steps in the described in the [redeploy approach](#redeploy).
351+
2. For [secrets](/azure/key-vault/secrets/about-secrets):
352+
1. Copy and save the secret value in the source key vault.
353+
1. Recreate the secret in the target key vault and set the value to saved secret.
354+
1. For [certificates](/azure/key-vault/certificates/about-certificates):
355+
1. Export the certificate into a PFX file.
356+
1. Import the PFX file into the target key vault. If you can't export the private key (`exportable` is not set) you must generate certificate a new certificate and import it into the target key vault.
357+
1. With the relocation of the associated Azure service the [keys](/azure/key-vault/keys/about-keys) are regenerated.
358+
1. Confirm that the keys have been generated for the associated service.
355359

356360
## Verify
357361

0 commit comments

Comments
 (0)