You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/key-vault/hsm-protected-keys-vendor-agnostic-byok.md
+11-13Lines changed: 11 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,19 +16,18 @@ ms.author: ambapat
16
16
# Import HSM-protected keys to Key Vault (preview)
17
17
18
18
> [!NOTE]
19
-
> This feature is currently in preview and only available in **East US 2 EUAP** and **Central US EUAP** regions.
19
+
> This feature is in preview and only available in **East US 2 EUAP** and **Central US EUAP** regions.
20
20
21
-
For added assurance, when you use Azure Key Vault, you can import or generate keys in hardware security modules (HSMs) that never leave the HSM boundary. This scenario is often referred to as *bring your own key*, or BYOK. Azure Key Vault uses nCipher nShield family of HSMs (FIPS 140-2 Level 2 validated) to protect your keys.
21
+
For added assurance when using Azure Key Vault, you can import or generate keys in hardware security modules (HSMs) that never leave the HSM boundary. This scenario is often referred to as *bring your own key*, or BYOK. Azure Key Vault uses nCipher nShield family of HSMs (FIPS 140-2 Level 2 validated) to protect your keys.
22
22
23
23
Use the information in this topic to help you plan for, generate, and then transfer your own HSM-protected keys to use with Azure Key Vault.
24
24
25
-
This functionality is not available for Azure China 21Vianet.
26
-
This import method is only available for [supported HSMs](#supported-hsms).
27
-
28
-
29
25
> [!NOTE]
30
-
> For more information about Azure Key Vault, see [What is Azure Key Vault?](key-vault-overview.md)
31
-
> For a getting started tutorial, which includes creating a key vault for HSM-protected keys, see [What is Azure Key Vault?](key-vault-overview.md).
26
+
> This functionality is not available for Azure China 21Vianet.
27
+
>
28
+
> This import method is only available for [supported HSMs](#supported-hsms).
29
+
30
+
For more information about Azure Key Vault, see [What is Azure Key Vault?](key-vault-overview.md) For a getting started tutorial, which includes creating a key vault for HSM-protected keys, see [What is Azure Key Vault?](key-vault-overview.md).
32
31
33
32
## Overview
34
33
@@ -72,7 +71,7 @@ You will use the following steps to generate and transfer your key to an Azure K
72
71
*[Step 3: Generate and prepare your key for transfer](#step-3-generate-and-prepare-your-key-for-transfer)
73
72
*[Step 4: Transfer your key to Azure Key Vault](#step-4-transfer-your-key-to-azure-key-vault)
74
73
75
-
## Step 1: Generate a KEK
74
+
###Step 1: Generate a KEK
76
75
77
76
The KEK (Key Exchange Key) is an RSA key generated in Key Vault's HSM. This key is used to encrypt the key to be imported (target key).
78
77
@@ -88,8 +87,7 @@ Use the [az keyvault key create](/cli/azure/keyvault/key?view=azure-cli-latest#a
Use the [az keyvault key download](/cli/azure/keyvault/key?view=azure-cli-latest#az-keyvault-key-download) to download the KEK public key into a .pem file. The target key you import is encrypted using the KEK public key.
Transfer the KEKforBYOK.publickey.pem file to your offline workstation. You will need this file during next step.
101
99
102
-
## Step 3: Generate and prepare your key for transfer
100
+
###Step 3: Generate and prepare your key for transfer
103
101
104
102
Please refer to your HSM vendor's documentation to download and install the BYOK tool. Follow instruction from your HSM vendor to generate a target key and then create a Key Transfer Package (a BYOK file). The BYOK tool will use the key identifier from [Step 1](#step-1-generate-a-kek) and KEKforBYOK.publickey.pem file you downloaded in [Step 2](#step-2-download-kek-public-key) to generate an encrypted target key in a BYOK file.
105
103
@@ -109,7 +107,7 @@ Transfer the BYOK file to your connected workstation.
109
107
> Target key must be an RSA key of size 2048-bit or 3072-bit or 4096-bit. Importing Elliptic Curve keys is not supported at this time.
110
108
> <br/><strong>Known issue:</strong> Importing RSA 4K target key from SafeNet Luna HSMs fails. When the issue is resolved this document will be updated.
111
109
112
-
## Step 4: Transfer your key to Azure Key Vault
110
+
###Step 4: Transfer your key to Azure Key Vault
113
111
114
112
For this final step, transfer the Key Transfer Package (a BYOK file) from your disconnected workstation to the Internet-connected workstation and then use the [az keyvault key import](/cli/azure/keyvault/key?view=azure-cli-latest#az-keyvault-key-import) command to upload the BYOK file the Azure Key Vault HSM, to complete the key import.
0 commit comments