You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/storage/common/storage-encryption-keys-cli.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,7 @@ For more information about configuring system-assigned managed identities with A
42
42
43
43
## Create a new key vault
44
44
45
-
The key vault that you use to store customer-managed keys for Azure Storage encryption must have two key protection settings enabled, **Soft Delete** and **Do Not Purge**. To create a new key vault using PowerShell or Azure CLI with these settings enabled, execute the following commands. Remember to replace the placeholder values in brackets with your own values.
45
+
The key vault that you use to store customer-managed keys for Azure Storage encryption must have two key protection settings enabled, **Soft Delete** and **Do Not Purge**. To create a new key vault using PowerShell or Azure CLI with these settings enabled, execute the following commands. Remember to replace the placeholder values in brackets with your own values.
46
46
47
47
To create a new key vault using Azure CLI, call [az keyvault create](/cli/azure/keyvault#az-keyvault-create). Remember to replace the placeholder values in brackets with your own values.
Copy file name to clipboardExpand all lines: articles/storage/common/storage-encryption-keys-portal.md
+41-10Lines changed: 41 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ author: tamram
7
7
8
8
ms.service: storage
9
9
ms.topic: how-to
10
-
ms.date: 12/04/2019
10
+
ms.date: 01/02/2020
11
11
ms.author: tamram
12
12
ms.reviewer: cbrooks
13
13
ms.subservice: common
@@ -19,9 +19,18 @@ ms.subservice: common
19
19
20
20
This article shows how to configure an Azure Key Vault with customer-managed keys using the [Azure portal](https://portal.azure.com/). To learn how to create a key vault using the Azure portal, see [Quickstart: Set and retrieve a secret from Azure Key Vault using the Azure portal](../../key-vault/quick-create-portal.md).
21
21
22
-
> [!IMPORTANT]
23
-
> Using customer-managed keys with Azure Storage encryption requires that two properties be set on the key vault, **Soft Delete** and **Do Not Purge**. These properties are not enabled by default. To enable these properties, use either PowerShell or Azure CLI.
24
-
> Only RSA keys and key size 2048 are supported.
22
+
## Configure your Azure Key Vault
23
+
24
+
You must use Azure Key Vault to store your customer-managed keys. You can either create your own keys and store them in a key vault, or you can use the Azure Key Vault APIs to generate keys. The storage account and the key vault must be in the same region, but they can be in different subscriptions. For more information about Azure Key Vault, see [What is Azure Key Vault?](../../key-vault/key-vault-overview.md).
25
+
26
+
Using customer-managed keys with Azure Storage encryption requires that two properties be set on the key vault, **Soft Delete** and **Do Not Purge**. These properties are not enabled by default, but can be enabled using either PowerShell or Azure CLI on a new or existing key vault.
27
+
28
+
To learn how to enable these properties on an existing key vault with PowerShell, see the sections titled **Enabling soft-delete** and **Enabling Purge Protection** in one of the following articles:
29
+
30
+
-[How to use soft-delete with PowerShell](../../key-vault/key-vault-soft-delete-powershell.md).
31
+
-[How to use soft-delete with CLI](../../key-vault/key-vault-soft-delete-cli.md).
32
+
33
+
Only RSA keys of size 2048 are supported with Azure Storage encryption. For more information about keys, see **Key Vault keys** in [About Azure Key Vault keys, secrets and certificates](../../key-vault/about-keys-secrets-and-certificates.md#key-vault-keys).
25
34
26
35
## Enable customer-managed keys
27
36
@@ -40,31 +49,53 @@ After you enable customer-managed keys, you'll have the opportunity to specify a
40
49
41
50
To specify a key as a URI, follow these steps:
42
51
43
-
1. To locate the key URI in the Azure portal, navigate to your key vault, and select the **Keys** setting. Select the desired key, then click the key to view its settings. Copy the value of the **Key Identifier** field, which provides the URI.
52
+
1. To locate the key URI in the Azure portal, navigate to your key vault, and select the **Keys** setting. Select the desired key, then click the key to view its versions. Select a key version to view the settings for that version.
53
+
1. Copy the value of the **Key Identifier** field, which provides the URI.
1. In the **Encryption** settings for your storage account, choose the **Enter key URI** option.
48
-
1.In the **Key URI** field, specify the URI.
58
+
1.Paste the URI that you copied into the **Key URI** field.
49
59
50
60

51
61
62
+
1. Specify the subscription that contains the key vault.
63
+
1. Save your changes.
64
+
52
65
### Specify a key from a key vault
53
66
54
67
To specify a key from a key vault, first make sure that you have a key vault that contains a key. To specify a key from a key vault, follow these steps:
55
68
56
69
1. Choose the **Select from Key Vault** option.
57
-
2.Choose the key vault containing the key you want to use.
58
-
3.Choose the key from the key vault.
70
+
2.Select the key vault containing the key you want to use.
Copy file name to clipboardExpand all lines: articles/storage/common/storage-encryption-keys-powershell.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,6 +21,7 @@ This article shows how to configure an Azure Key Vault with customer-managed key
21
21
22
22
> [!IMPORTANT]
23
23
> Using customer-managed keys with Azure Storage encryption requires that two properties be set on the key vault, **Soft Delete** and **Do Not Purge**. These properties are not enabled by default. To enable these properties, use either PowerShell or Azure CLI.
0 commit comments