Skip to content

Commit 24baab6

Browse files
committed
Formatting updates
1 parent 0a6a922 commit 24baab6

File tree

1 file changed

+25
-29
lines changed

1 file changed

+25
-29
lines changed

articles/service-bus-messaging/configure-customer-managed-key.md

Lines changed: 25 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -33,62 +33,58 @@ To enable customer-managed keys in the Azure portal, follow these steps:
3333

3434
After you enable customer-managed keys, you need to associate the customer managed key with your Azure Service Bus namespace. Service Bus supports only Azure Key Vault. If you enable the **Encryption with customer-managed key** option in the previous section, you need to have the key imported into Azure Key Vault. Also, the keys must have **Soft Delete** and **Do Not Purge** configured for the key. These settings can be configured using [PowerShell](/azure/key-vault/general/key-vault-recovery) or [CLI](/azure/key-vault/general/key-vault-recovery).
3535

36+
### Creaet a keyvault or keyvault managed HSM
37+
38+
> [!IMPORTANT]
39+
> Using customer-managed keys with Azure Service Bus requires that the vault have two required properties configured. They are: **Soft Delete** and **Do Not Purge**. The Soft Delete property is enabled by default when you create a new vault in the Azure portal whereas the Purge Protection is optional so make sure to select it when creating the vault. Also, if you need to enable these properties on an existing key vault, you must use either PowerShell or Azure CLI.
40+
3641
# [Key Vault](#tab/Key-Vault)
37-
38-
1. To create a new Key Vault, follow the Azure Key Vault [Quickstart](/azure/key-vault/general/quick-create-cli).
42+
43+
1. To create a new Key Vault, follow the Azure Key Vault [Quickstart](/azure/key-vault/general/quick-create-cli). For information about Azure KeyVault, see [About Azure KeyVault](/azure/key-vault/general/overview).
3944
2. To turn on both soft delete and purge protection when creating a vault, use the [az keyvault create](/cli/azure/keyvault#az-keyvault-create) command.
4045

41-
```azurecli-interactive
42-
az keyvault create --name contoso-SB-BYOK-keyvault --resource-group ContosoRG --location westus --enable-soft-delete true --enable-purge-protection true
43-
```
44-
46+
```azurecli-interactive
47+
az keyvault create --name contoso-SB-BYOK-keyvault --resource-group ContosoRG --location westus --enable-soft-delete true --enable-purge-protection true
48+
```
4549
3. To add purge protection to an existing vault (that already has soft delete enabled), use the [az keyvault update](/cli/azure/keyvault#az-keyvault-update) command.
4650
47-
```azurecli-interactive
48-
az keyvault update --name contoso-SB-BYOK-keyvault --resource-group ContosoRG --enable-purge-protection true
49-
```
51+
```azurecli-interactive
52+
az keyvault update --name contoso-SB-BYOK-keyvault --resource-group ContosoRG --enable-purge-protection true
53+
```
5054
5155
# [Key Vault Managed HSM](#tab/Key-Vault-Managed-HSM)
5256
53-
1. To create a new Managed HSM, follow the Managed HSM [Quickstart](/azure/key-vault/managed-hsm/quick-create-cli).
57+
1. To create a new Managed HSM, follow the Managed HSM [Quickstart](/azure/key-vault/managed-hsm/quick-create-cli). For information about Azure KeyVault, see [About Azure KeyVault](/azure/key-vault/general/overview).
5458
2. To turn on both soft delete and purge protection when creating a vault, use the [az keyvault create](/cli/azure/keyvault#az-keyvault-create) command.
5559
56-
```azurecli-interactive
57-
az keyvault create --hsm-name contoso-SB-BYOK-keyvault --resource-group ContosoRG --location westus --enable-purge-protection true --retention-days 90 --administrators aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb
58-
```
59-
60-
After creation, you need to [activate the Managed HSM](/azure/key-vault/managed-hsm/quick-create-cli#activate-your-managed-hsm) and ensure that you have the correct permissions to generate keys by [assigning an RBAC role and local RBAC role](/azure/key-vault/managed-hsm/secure-your-managed-hsm) with the correct permissions.
60+
```azurecli-interactive
61+
az keyvault create --hsm-name contoso-SB-BYOK-keyvault --resource-group ContosoRG --location westus --enable-purge-protection true --retention-days 90 --administrators aaaaaaaa-0000-1111-2222-bbbbbbbbbbbb
62+
```
6163
64+
After creation, you need to [activate the Managed HSM](/azure/key-vault/managed-hsm/quick-create-cli#activate-your-managed-hsm) and ensure that you have the correct permissions to generate keys by [assigning an RBAC role and local RBAC role](/azure/key-vault/managed-hsm/secure-your-managed-hsm) with the correct permissions.
6265
3. To add purge protection to an existing vault (that already has soft delete enabled), use the [az keyvault update](/cli/azure/keyvault#az-keyvault-update) command.
6366
64-
```azurecli-interactive
65-
az keyvault update --hsm-name contoso-SB-BYOK-keyvault --resource-group ContosoRG --enable-purge-protection true
66-
```
67+
```azurecli-interactive
68+
az keyvault update --hsm-name contoso-SB-BYOK-keyvault --resource-group ContosoRG --enable-purge-protection true
69+
```
6770
6871
---
6972
70-
For more information about importing existing keys, see [About keys, secrets, and certificates](/azure/key-vault/general/about-keys-secrets-certificates).
71-
72-
> [!IMPORTANT]
73-
> Using customer-managed keys with Azure Service Bus requires that the vault have two required properties configured. They are: **Soft Delete** and **Do Not Purge**. The Soft Delete property is enabled by default when you create a new vault in the Azure portal whereas the Purge Protection is optional so make sure to select it when creating the vault. Also, if you need to enable these properties on an existing key vault, you must use either PowerShell or Azure CLI.
74-
73+
## Create keys
7574
Create keys by following these steps:
7675
7776
1. To create a new key, select **Generate/Import** from the **Keys** menu under **Settings**.
7877
79-
![Screenshot showing the Generate/Import button.](./media/configure-customer-managed-key/select-generate-import.png)
80-
78+
![Screenshot showing the Generate/Import button.](./media/configure-customer-managed-key/select-generate-import.png)
8179
1. Set **Options** to **Generate** and give the key a name.
8280
83-
![Screenshot that shows how to name a key.](./media/configure-customer-managed-key/create-key.png)
84-
81+
![Screenshot that shows how to name a key.](./media/configure-customer-managed-key/create-key.png)
8582
1. You can now select this key to associate with the Service Bus namespace for encrypting from the drop-down list.
8683
8784
![Screenshot that shows how to select a key from key vault.](./media/configure-customer-managed-key/select-key-from-key-vault.png)
8885
8986
> [!NOTE]
90-
> For redundancy, you can add up to three keys. If one of the keys is expired, or isn't accessible, the other keys are used for encryption.
91-
87+
> For redundancy, you can add up to three keys. If one of the keys is expired, or isn't accessible, the other keys are used for encryption.
9288
1. Fill in the details for the key and click **Select**. It enables the encryption of the Microsoft-managed key with your key (customer-managed key).
9389
9490
> [!IMPORTANT]

0 commit comments

Comments
 (0)