Skip to content

Commit 1a32e9b

Browse files
committed
Add section to disable cmk.
1 parent 5b25ff8 commit 1a32e9b

File tree

1 file changed

+23
-0
lines changed

1 file changed

+23
-0
lines changed

articles/azure-app-configuration/concept-customer-managed-keys.md

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -107,6 +107,29 @@ After these resources are configured, use the following steps so that the Azure
107107
108108
Your Azure App Configuration instance is now configured to use a customer-managed key stored in Azure Key Vault.
109109
110+
## Disable customer-managed key encryption for your App Configuration store
111+
112+
1. Use the Azure CLI to update your App Configuration instance and remove the customer-managed key configuration. Replace `contoso-resource-group` and `contoso-app-config` with the appropriate values for your setup.
113+
114+
```azurecli
115+
az appconfig update -g contoso-resource-group -n contoso-app-config --encryption-key-name ""
116+
```
117+
118+
This command removes the customer-managed key configuration from your App Configuration instance.
119+
120+
1. Verify that the customer-managed key configuration has been removed by checking the properties of your App Configuration instance.
121+
122+
```azurecli
123+
az appconfig show -g contoso-resource-group -n contoso-app-config --query "encryption"
124+
```
125+
126+
The output should show that the `encryption.keyVaultProperties` property is set to `null`.
127+
128+
Your Azure App Configuration instance is now configured to use Microsoft managed keys for encryption.
129+
130+
> [!NOTE]
131+
> Disabling customer-managed key encryption will revert your App Configuration instance to use Microsoft managed keys. Ensure that this change aligns with your organization's security policies and compliance requirements.
132+
110133
## Access Revocation
111134
112135
When users enable the customer-managed key capability on their Azure App Configuration instance, they control the service’s ability to access their sensitive information. The managed key serves as a root encryption key. Users can revoke their App Configuration instance’s access to their managed key by changing their key vault access policy. When this access is revoked, App Configuration will lose the ability to decrypt user data within one hour. At this point, the App Configuration instance will forbid all access attempts. This situation is recoverable by granting the service access to the managed key once again. Within one hour, App Configuration will be able to decrypt user data and operate under normal conditions.

0 commit comments

Comments
 (0)