Skip to content

Commit 2eff425

Browse files
committed
region references
1 parent e8cea13 commit 2eff425

File tree

3 files changed

+8
-9
lines changed

3 files changed

+8
-9
lines changed

articles/azure-netapp-files/customer-managed-keys-cross-tenant.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ This feature is currently in preview. You need to register the feature before us
4545
2. Check the status of the feature registration:
4646
4747
> [!NOTE]
48-
> The **RegistrationState** may be in the `Registering` state for up to 60 minutes before changing to`Registered`. Wait until the status is **Registered** before continuing.
48+
> The **RegistrationState** can remain in the `Registering` state for up to 60 minutes before changing to`Registered`. Wait until the status is **Registered** before continuing.
4949
5050
```azurepowershell-interactive
5151
Get-AzProviderFeature -ProviderNamespace Microsoft.NetApp -FeatureName ANFCrossTenantCMK
@@ -95,7 +95,7 @@ The configuration process for cross-tenant customer-managed keys has portions th
9595
### Authorize access to the key vault
9696
9797
1. Install the service provider application in the customer tenant
98-
1. Get the Admin Consent URL from the provider for their cross-tenant application. In our example the URL would look like: `https://login.microsoftonline.com/<tenant1-tenantId>/adminconsent/client_id=<client/application ID for the cross tenant-application>`. This opens a login page where you enter your credentials. Once you enter your credentials, you may see an error stating there's no redirect URL configured; this is OK.
98+
1. Get the Admin Consent URL from the provider for their cross-tenant application. In our example the URL would look like: `https://login.microsoftonline.com/<tenant1-tenantId>/adminconsent/client_id=<client/application-ID-for-the-cross-tenant-application>`. The URL opens a sign-in page prompting you to enter your credentials. Once you enter your credentials, you might see an error stating there's no redirect URL configured; this is OK.
9999
1. Grant the service provider application access to the key vault.
100100
1. Navigate to your key vault. Select **Access Control (IAM)** from the left pane.
101101
1. Under Grant access to this resource, select **Add role assignment**.
@@ -111,7 +111,7 @@ The configuration process for cross-tenant customer-managed keys has portions th
111111
### Configure the NetApp account to use your keys
112112
113113
>[!NOTE]
114-
>Using the `az rest` command is the only supported way to to configure your NetApp account to use CMK in a different tenant.
114+
>Using the `az rest` command is the only supported way to configure your NetApp account to use CMK in a different tenant.
115115
116116
1. With the `az rest` command, configure the NetApp account to use CMK in a different tenant:
117117

articles/azure-netapp-files/faq-security.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,16 +5,15 @@ ms.service: azure-netapp-files
55
ms.topic: conceptual
66
author: b-hchen
77
ms.author: anfdocs
8-
ms.date: 10/24/2024
9-
ms.custom: references_regions
8+
ms.date: 04/23/2025
109
---
1110
# Security FAQs for Azure NetApp Files
1211

1312
This article answers frequently asked questions (FAQs) about Azure NetApp Files security.
1413

15-
## Can the network traffic between the Azure VM and the storage be encrypted?
14+
## Can the network traffic between the Azure virtual machine (VM) and the storage be encrypted?
1615

17-
Azure NetApp Files data traffic is inherently secure by design, as it doesn't provide a public endpoint, and data traffic stays within customer-owned VNet. Data-in-flight isn't encrypted by default. However, data traffic from an Azure VM (running an NFS or SMB client) to Azure NetApp Files is as secure as any other Azure-VM-to-VM traffic.
16+
Azure NetApp Files data traffic is inherently secure by design, as it doesn't provide a public endpoint, and data traffic stays within customer-owned virtual network (VNet). Data-in-flight isn't encrypted by default. However, data traffic from an Azure VM (running an NFS or SMB client) to Azure NetApp Files is as secure as any other Azure-VM-to-VM traffic.
1817

1918
NFSv3 protocol doesn't provide support for encryption, so this data-in-flight can't be encrypted. However, NFSv4.1 and SMB3 data-in-flight encryption can optionally be enabled. Data traffic between NFSv4.1 clients and Azure NetApp Files volumes can be encrypted using Kerberos with AES-256 encryption. See [Configure NFSv4.1 Kerberos encryption for Azure NetApp Files](configure-kerberos-encryption.md) for details. Data traffic between SMB3 clients and Azure NetApp Files volumes can be encrypted using the AES-CCM algorithm on SMB 3.0, and the AES-GCM algorithm on SMB 3.1.1 connections. See [Create an SMB volume for Azure NetApp Files](azure-netapp-files-create-volumes-smb.md) for details.
2019

@@ -30,7 +29,7 @@ Azure NetApp Files cross-region and cross-zone replication uses TLS 1.2 AES-256
3029

3130
By default key management for Azure NetApp Files is handled by the service, using [platform-managed keys](../security/fundamentals/key-management.md). A unique XTS-AES-256 data encryption key is generated for each volume. An encryption key hierarchy is used to encrypt and protect all volume keys. These encryption keys are never displayed or reported in an unencrypted format. When you delete a volume, Azure NetApp Files immediately deletes the volume's encryption keys.
3231

33-
Alternatively, [customer-managed keys for Azure NetApp Files volume encryption](configure-customer-managed-keys.md) can be used where keys are stored in [Azure Key Vault](/azure/key-vault/general/basic-concepts). With customer-managed keys, you can fully manage the relationship between a key's life cycle, key usage permissions, and auditing operations on keys. The feature is generally available (GA) in [supported regions](configure-customer-managed-keys.md#supported-regions). [Azure NetApp Files volume encryption with customer-managed keys with the managed Hardware Security Module](configure-customer-managed-keys-hardware.md) is an extension to this feature, allowing you to store your encryption keys in a more secure FIPS 140-2 Level 3 HSM instead of the FIPS 140-2 Level 1 or Level 2 service used by Azure Key Vault.
32+
Alternatively, [customer-managed keys for Azure NetApp Files volume encryption](configure-customer-managed-keys.md) can be used where keys are stored in [Azure Key Vault](/azure/key-vault/general/basic-concepts). With customer-managed keys, you can fully manage the relationship between a key's life cycle, key usage permissions, and auditing operations on keys. The feature is generally available (GA). [Azure NetApp Files volume encryption with customer-managed keys with the managed Hardware Security Module](configure-customer-managed-keys-hardware.md) is an extension to this feature, allowing you to store your encryption keys in a more secure FIPS 140-2 Level 3 HSM instead of the FIPS 140-2 Level 1 or Level 2 service used by Azure Key Vault.
3433

3534
Azure NetApp Files supports the ability to move existing volumes using platform-managed keys to customer-managed keys. Once you complete the transition, you cannot revert back to platform-managed keys. For additional information, see [Transition an Azure NetApp Files volume to customer-managed keys](configure-customer-managed-keys.md#transition).
3635

articles/azure-netapp-files/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -216,7 +216,7 @@ Azure NetApp Files is updated regularly. This article provides a summary about t
216216

217217
Azure NetApp Files now supports the ability to transition an existing volume to use customer-managed keys for volume encryption.
218218

219-
* [Customer-managed keys for Azure NetApp Files volume encryption](configure-customer-managed-keys.md#supported-regions) is now available in all US Gov regions
219+
* [Customer-managed keys for Azure NetApp Files volume encryption](configure-customer-managed-keys.md) is now available in all US Gov regions
220220

221221
* [Azure NetApp Files large volume enhancement:](large-volumes-requirements-considerations.md) increased throughput and maximum size limit of 2-PiB volume (preview)
222222

0 commit comments

Comments
 (0)