Skip to content

Commit 236d6b9

Browse files
authored
Merge pull request #206092 from yossi-y/main
Added RBAC details
2 parents 520909c + 4d70a93 commit 236d6b9

File tree

1 file changed

+17
-10
lines changed

1 file changed

+17
-10
lines changed

articles/azure-monitor/logs/customer-managed-keys.md

Lines changed: 17 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ After the Customer-managed key configuration, new ingested data to workspaces li
3636
> [!IMPORTANT]
3737
> Customer-managed key capability is regional. Your Azure Key Vault, cluster and linked workspaces must be in the same region, but they can be in different subscriptions.
3838
39-
![Customer-managed key overview](media/customer-managed-keys/cmk-overview.png)
39+
[![Customer-managed key overview](media/customer-managed-keys/cmk-overview.png "Screenshot of Customer-managed key diagram.")](media/customer-managed-keys/cmk-overview.png#lightbox)
4040

4141
1. Key Vault
4242
2. Log Analytics cluster resource having managed identity with permissions to Key Vault—The identity is propagated to the underlay dedicated cluster storage
@@ -73,7 +73,7 @@ Customer-managed key configuration isn't supported in Azure portal currently and
7373

7474
Create or use an existing Azure Key Vault in the region that the cluster is planed, and generate or import a key to be used for logs encryption. The Azure Key Vault must be configured as recoverable, to protect your key and the access to your data in Azure Monitor. You can verify this configuration under properties in your Key Vault, both *Soft delete* and *Purge protection* should be enabled.
7575

76-
![Soft delete and purge protection settings](media/customer-managed-keys/soft-purge-protection.png)
76+
[![Soft delete and purge protection settings](media/customer-managed-keys/soft-purge-protection.png "Screenshot of Key Vault soft delete and purge protection properties")](media/customer-managed-keys/soft-purge-protection.png#lightbox)
7777

7878
These settings can be updated in Key Vault via CLI and PowerShell:
7979

@@ -97,16 +97,23 @@ Follow the procedure illustrated in [Dedicated Clusters article](./logs-dedicate
9797

9898
## Grant Key Vault permissions
9999

100-
Create Access Policy in Key Vault to grants permissions to your cluster. These permissions are used by the underlay cluster storage. Open your Key Vault in Azure portal and click *Access Policies* then *+ Add Access Policy* to create a policy with these settings:
100+
There are two permission models in Key Vault to grants permissions to your cluster and underlay storage, Vault access policy and Azure role-based access control.
101101

102-
- Key permissions—select *Get*, *Wrap Key* and *Unwrap Key*.
103-
- Select principal—depending on the identity type used in the cluster (system or user assigned managed identity)
104-
- System assigned managed identity - enter the cluster name or cluster principal ID
105-
- User assigned managed identity - enter the identity name
102+
1. Vault access policy
106103

107-
![grant Key Vault permissions](media/customer-managed-keys/grant-key-vault-permissions-8bit.png)
104+
Open your Key Vault in Azure portal and click *Access Policies*, select *Vault access policy*, then click *+ Add Access Policy* to create a policy with these settings:
108105

109-
The *Get* permission is required to verify that your Key Vault is configured as recoverable to protect your key and the access to your Azure Monitor data.
106+
- Key permissions—select *Get*, *Wrap Key* and *Unwrap Key*.
107+
- Select principal—depending on the identity type used in the cluster (system or user assigned managed identity)
108+
- System assigned managed identity - enter the cluster name or cluster principal ID
109+
- User assigned managed identity - enter the identity name
110+
111+
[![grant Key Vault permissions](media/customer-managed-keys/grant-key-vault-permissions-8bit.png "Screenshot of Key Vault access policy permissions")](media/customer-managed-keys/grant-key-vault-permissions-8bit.png#lightbox)
112+
113+
The *Get* permission is required to verify that your Key Vault is configured as recoverable to protect your key and the access to your Azure Monitor data.
114+
115+
2. Azure role-based access control
116+
Open your Key Vault in Azure portal and click *Access Policies*, select *Azure role-based access control*, then enter *Access control (IAM)* and add *Key Vault Crypto Service Encryption User* role assignment.
110117

111118
## Update cluster with key identifier details
112119

@@ -118,7 +125,7 @@ This step updates dedicated cluster storage with the key and version to use for
118125
>- Key rotation can be automatic or require explicit key update, see [Key rotation](#key-rotation) to determine approach that is suitable for you before updating the key identifier details in cluster.
119126
>- Cluster update should not include both identity and key identifier details in the same operation. If you need to update both, the update should be in two consecutive operations.
120127
121-
![Grant Key Vault permissions](media/customer-managed-keys/key-identifier-8bit.png)
128+
[![Grant Key Vault permissions](media/customer-managed-keys/key-identifier-8bit.png "Screenshot of Key Vault key identifier details")](media/customer-managed-keys/key-identifier-8bit.png#lightbox)
122129

123130
Update KeyVaultProperties in cluster with key identifier details.
124131

0 commit comments

Comments
 (0)