Skip to content

Commit 2b248da

Browse files
committed
Updates
1 parent 789ad48 commit 2b248da

File tree

5 files changed

+19
-20
lines changed

5 files changed

+19
-20
lines changed

articles/virtual-machines/linux/disk-encryption-faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ sections:
8484
To rotate secrets, just call the same command you used originally to enable disk encryption, specifying a different Key Vault. To rotate the key encryption key, call the same command you used originally to enable disk encryption, specifying the new key encryption.
8585
8686
>[!WARNING]
87-
> - If you have previously used [Azure Disk Encryption with Azure AD app](disk-encryption-linux-aad.md) by specifying Azure AD credentials to encrypt this VM, you will have to continue use this option to encrypt your VM. You can't use Azure Disk Encryption on this encrypted VM as this isn't a supported scenario, meaning switching away from AAD application for this encrypted VM isn't supported yet.
87+
> - If you have previously used [Azure Disk Encryption with Azure AD app](disk-encryption-linux-aad.md) by specifying Azure AD credentials to encrypt this VM, you will have to continue use this option to encrypt your VM. You can't use Azure Disk Encryption on this encrypted VM as this isn't a supported scenario, meaning switching away from Azure AD application for this encrypted VM isn't supported yet.
8888
8989
- question: |
9090
How do I add or remove a key encryption key if I didn't originally use one?

articles/virtual-machines/linux/disk-encryption-isolated-network.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.custom: seodec18
1414
---
1515
# Azure Disk Encryption on an isolated network
1616

17-
**Applies to:** :heavy_check_mark: Linux VMs :heavy_check_mark: Flexible scale sets
17+
**Applies to:** :heavy_check_mark: Linux VMs :heavy_check_mark: Flexible scale sets.
1818

1919
When connectivity is restricted by a firewall, proxy requirement, or network security group (NSG) settings, the ability of the extension to perform needed tasks might be disrupted. This disruption can result in status messages such as "Extension status not available on the VM."
2020

@@ -40,7 +40,7 @@ Any network security group settings that are applied must still allow the endpoi
4040

4141
## Azure Disk Encryption with Azure AD (previous version)
4242

43-
If using [Azure Disk Encryption with Azure AD (previous version)](disk-encryption-overview-aad.md), the [Microsoft Authentication Library](../../active-directory/develop/msal-overview.md) will need to be installed manually for all distros (in addition to the packages appropriate for the distro, as [listed above](#package-management)).
43+
If using [Azure Disk Encryption with Azure AD (previous version)](disk-encryption-overview-aad.md), the [Microsoft Authentication Library](../../active-directory/develop/msal-overview.md) will need to be installed manually for all distros (in addition to the [packages appropriate for the distro](#package-management)).
4444

4545
When encryption is being enabled with [Azure AD credentials](disk-encryption-linux-aad.md), the target VM must allow connectivity to both Azure Active Directory endpoints and Key Vault endpoints. Current Azure Active Directory authentication endpoints are maintained in sections 56 and 59 of the [Microsoft 365 URLs and IP address ranges](/microsoft-365/enterprise/urls-and-ip-address-ranges) documentation. Key Vault instructions are provided in the documentation on how to [Access Azure Key Vault behind a firewall](../../key-vault/general/access-behind-firewall.md).
4646

articles/virtual-machines/linux/disk-encryption-key-vault-aad.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ You can manage your key vault with Azure CLI using the [az keyvault](/cli/azure/
8585
You can create a key vault by using the [Resource Manager template](https://github.com/Azure/azure-quickstart-templates/tree/master/quickstarts/microsoft.keyvault/key-vault-create).
8686
8787
1. On the Azure quickstart template, click **Deploy to Azure**.
88-
2. Select the subscription, resource group, resource group location, Key Vault name, Object ID, legal terms, and agreement, and then click **Purchase**.
88+
2. Select the subscription, resource group, resource group location, Key Vault name, Object ID, legal terms, and agreement, and then select **Purchase**.
8989
9090
9191
## <a name="bkmk_ADapp"></a> Set up an Azure AD app and service principal
@@ -118,7 +118,7 @@ You can manage your service principals with Azure CLI using the [az ad sp](/cli/
118118
```
119119
3. The appId returned is the Azure AD ClientID used in other commands. It's also the SPN you'll use for az keyvault set-policy. The password is the client secret that you should use later to enable Azure Disk Encryption. Safeguard the Azure AD client secret appropriately.
120120
121-
### <a name="bkmk_ADappRM"></a> Set up an Azure AD app and service principal though the Azure portal
121+
### <a name="bkmk_ADappRM"></a> Set up an Azure AD app and service principal through the Azure portal
122122
Use the steps from the [Use portal to create an Azure Active Directory application and service principal that can access resources](../../active-directory/develop/howto-create-service-principal-portal.md) article to create an Azure AD application. Each step listed below will take you directly to the article section to complete.
123123
124124
1. [Verify required permissions](../../active-directory/develop/howto-create-service-principal-portal.md#permissions-required-for-registering-an-app)
@@ -159,11 +159,11 @@ az keyvault set-policy --name "MySecureVault" --spn "<spn created with CLI/the A
159159
### <a name="bkmk_KVAPRM"></a> Set the key vault access policy for the Azure AD app with the portal
160160

161161
1. Open the resource group with your key vault.
162-
2. Select your key vault, go to **Access Policies**, then click **Add new**.
162+
2. Select your key vault, go to **Access Policies**, then select **Add new**.
163163
3. Under **Select principal**, search for the Azure AD application you created and select it.
164164
4. For **Key permissions**, check **Wrap Key** under **Cryptographic Operations**.
165165
5. For **Secret permissions**, check **Set** under **Secret Management Operations**.
166-
6. Click **OK** to save the access policy.
166+
6. Select **OK** to save the access policy.
167167

168168
![Azure Key Vault cryptographic operations - Wrap Key](./media/disk-encryption/keyvault-portal-fig3.png)
169169

@@ -218,7 +218,7 @@ Use [az keyvault update](/cli/azure/keyvault#az-keyvault-update) to enable disk
218218
1. Select your keyvault, go to **Access Policies**, and **Click to show advanced access policies**.
219219
2. Select the box labeled **Enable access to Azure Disk Encryption for volume encryption**.
220220
3. Select **Enable access to Azure Virtual Machines for deployment** and/or **Enable Access to Azure Resource Manager for template deployment**, if needed.
221-
4. Click **Save**.
221+
4. Select **Save**.
222222
223223
![Azure key vault advanced access policies](./media/disk-encryption/keyvault-portal-fig4.png)
224224

articles/virtual-machines/linux/disk-encryption-troubleshooting.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,6 @@ Before taking any of the steps below, first ensure that the VMs you are attempti
2323
- [Networking requirements](disk-encryption-overview.md#networking-requirements)
2424
- [Encryption key storage requirements](disk-encryption-overview.md#encryption-key-storage-requirements)
2525

26-
2726

2827
## Troubleshooting Linux OS disk encryption
2928

articles/virtual-machines/linux/disk-encryption-upgrade.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.custom: seodec18, devx-track-azurecli, devx-track-azurepowershell
1414

1515
# Upgrading the Azure Disk Encryption version
1616

17-
The first version of Azure Disk Encryption (ADE) relied on Azure Active Directory (AAD) for authentication; the current version does not. We strongly encourage the use of the newest version.
17+
The first version of Azure Disk Encryption (ADE) relied on Azure Active Directory (Azure AD) for authentication; the current version does not. We strongly encourage the use of the newest version.
1818

1919
## Determine ADE version
2020

@@ -58,12 +58,12 @@ Choose the "AzureDiskEncryption" extension for Windows or "AzureDiskEncryptionFo
5858

5959
## How to migrate
6060

61-
Migration from Azure Disk Encryption (with AAD) to Azure Disk Encryption (without AAD) is only available through Azure PowerShell. Ensure you have the latest version of Azure PowerShell and at least the [Azure PowerShell Az module version 5.9.0](/powershell/azure/new-azureps-module-az) installed .
61+
Migration from Azure Disk Encryption (with Azure AD) to Azure Disk Encryption (without Azure AD) is only available through Azure PowerShell. Ensure you have the latest version of Azure PowerShell and at least the [Azure PowerShell Az module version 5.9.0](/powershell/azure/new-azureps-module-az) installed .
6262

63-
To upgrade from Azure Disk Encryption (with AAD) to Azure Disk Encryption (without AAD), use the [Set-AzVMDiskEncryptionExtension](/powershell/module/az.compute/set-azvmdiskencryptionextension) PowerShell cmdlet.
63+
To upgrade from Azure Disk Encryption (with Azure AD) to Azure Disk Encryption (without Azure AD), use the [Set-AzVMDiskEncryptionExtension](/powershell/module/az.compute/set-azvmdiskencryptionextension) PowerShell cmdlet.
6464

6565
> [!WARNING]
66-
> The Set-AzVMDiskEncryptionExtension cmdlet must only be used on VMs encrypted with Azure Disk Encryption (with AAD). Attempting to migrate an unencrypted VM, or a VM encrypted with Azure Disk Encryption (without AAD), will result in a terminal error.
66+
> The Set-AzVMDiskEncryptionExtension cmdlet must only be used on VMs encrypted with Azure Disk Encryption (with Azure AD). Attempting to migrate an unencrypted VM, or a VM encrypted with Azure Disk Encryption (without Azure AD), will result in a terminal error.
6767
6868
```azurepowershell-interactive
6969
Set-AzVMDiskEncryptionExtension -ResourceGroupName <resourceGroupName> -VMName <vmName> -Migrate
@@ -75,26 +75,26 @@ When the cmdlet prompts you for confirmation, enter "Y". The ADE version will b
7575
> Set-AzVMDiskEncryptionExtension -ResourceGroupName myResourceGroup -VMName myVM -Migrate
7676

7777
Update AzureDiskEncryption version?
78-
This cmdlet updates Azure Disk Encryption version to single pass (Azure Disk Encryption without AAD). This may reboot
78+
This cmdlet updates Azure Disk Encryption version to single pass (Azure Disk Encryption without Azure AD). This may reboot
7979
the machine and takes 10-15 minutes to finish. Are you sure you want to continue?
8080
[Y] Yes [N] No [S] Suspend [?] Help (default is "Y"): Y
8181
Azure Disk Encryption Extension Public Settings
8282
"KeyVaultResourceId": /subscriptions/ea500758-3163-4849-bd2c-3e50f06efa7a/resourceGroups/myResourceGroup/providers/Microsoft.KeyVault/vaults/myKeyVault
8383
"SequenceVersion":
8484
"MigrateFlag": Migrate
8585
"KeyVaultURL": https://myKeyVault.vault.azure.net/
86-
"AADClientID": d29edf8c-3fcb-42e7-8410-9e39fdf0dd70
86+
"Azure ADClientID": d29edf8c-3fcb-42e7-8410-9e39fdf0dd70
8787
"KeyEncryptionKeyURL":
8888
"KekVaultResourceId":
8989
"EncryptionOperation": EnableEncryption
90-
"AADClientCertThumbprint":
90+
"Azure ADClientCertThumbprint":
9191
"VolumeType":
9292
"KeyEncryptionAlgorithm":
9393

94-
Running ADE extension (with AAD) for -Migrate..
95-
ADE extension (with AAD) is now complete. Updating VM model..
96-
Running ADE extension (without AAD) for -Migrate..
97-
ADE extension (without AAD) is now complete. Clearing VM model..
94+
Running ADE extension (with Azure AD) for -Migrate..
95+
ADE extension (with Azure AD) is now complete. Updating VM model..
96+
Running ADE extension (without Azure AD) for -Migrate..
97+
ADE extension (without Azure AD) is now complete. Clearing VM model..
9898

9999
RequestId IsSuccessStatusCode StatusCode ReasonPhrase
100100
--------- ------------------- ---------- ------------

0 commit comments

Comments
 (0)