Skip to content

Commit 3c50225

Browse files
Merge pull request #211520 from tamram/tamram22-0915
add xtenant CMK feature support + fix tabs
2 parents 275b2b1 + 9478ec4 commit 3c50225

8 files changed

+16
-15
lines changed

articles/storage/blobs/storage-feature-support-in-storage-accounts.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,8 @@ The following table describes whether a feature is supported in a standard gener
5959
| [Change feed](storage-blob-change-feed.md) | ✅ |  ⬤ |  ⬤ |  ⬤ |
6060
| [Custom domains](storage-custom-domain-name.md) | ✅ | 🟦 | 🟦 | 🟦 |
6161
| [Customer-managed account failover](../common/storage-disaster-recovery-guidance.md?toc=%2fazure%2fstorage%2fblobs%2ftoc.json) | ✅ |  ⬤ |  ⬤ |  ⬤ |
62-
| [Customer-managed keys (encryption)](../common/customer-managed-keys-overview.md?toc=/azure/storage/blobs/toc.json) | ✅ | ✅ | ✅ | ✅ |
62+
| [Customer-managed keys in a single-tenant scenario (encryption)](../common/customer-managed-keys-overview.md?toc=/azure/storage/blobs/toc.json) | ✅ | ✅ | ✅ | ✅ |
63+
| [Customer-managed keys in a multi-tenant scenario (encryption)](../common/customer-managed-keys-overview.md?toc=/azure/storage/blobs/toc.json) | 🟦 | 🟦 |  ⬤ |  ⬤ |
6364
| [Customer-provided keys (encryption)](encryption-customer-provided-keys.md) | ✅ |  ⬤ |  ⬤ |  ⬤ |
6465
| [Data redundancy options](../common/storage-redundancy.md?toc=/azure/storage/blobs/toc.json) | &#x2705; | &#x2705; | &#x2705;<sup>2</sup> | &#x2705; |
6566
| [Encryption scopes](encryption-scope-overview.md) | &#x2705; | &nbsp;&#x2B24; | &nbsp;&#x2B24; | &nbsp;&#x2B24; |

articles/storage/common/customer-managed-keys-configure-cross-tenant-existing-account.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ When you configure encryption with customer-managed keys for an existing storage
9393
>
9494
> Azure Storage checks the key vault for a new key version only once daily. When you rotate a key in Azure Key Vault, be sure to wait 24 hours before disabling the older version.
9595
96-
### [Azure portal](#tab/portal)
96+
### [Azure portal](#tab/azure-portal)
9797

9898
To configure cross-tenant customer-managed keys for an existing storage account in the Azure portal, follow these steps:
9999

@@ -117,7 +117,7 @@ After you've specified the key from the key vault in the customer's tenant, the
117117

118118
:::image type="content" source="media/customer-managed-keys-configure-cross-tenant-existing-account/portal-cross-tenant-cmk-settings.png" alt-text="Screenshot showing cross-tenant customer-managed key configuration.":::
119119

120-
### [PowerShell](#tab/powershell)
120+
### [PowerShell](#tab/azure-powershell)
121121

122122
N/A
123123

articles/storage/common/customer-managed-keys-configure-cross-tenant-new-account.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -93,7 +93,7 @@ When you configure encryption with customer-managed keys for an existing storage
9393
>
9494
> Azure Storage checks the key vault for a new key version only once daily. When you rotate a key in Azure Key Vault, be sure to wait 24 hours before disabling the older version.
9595
96-
### [Azure portal](#tab/portal)
96+
### [Azure portal](#tab/azure-portal)
9797

9898
To configure cross-tenant customer-managed keys for a new storage account in the Azure portal, follow these steps:
9999

@@ -109,7 +109,7 @@ To configure cross-tenant customer-managed keys for a new storage account in the
109109

110110
1. Select the **Review** button to validate and create the account.
111111

112-
### [PowerShell](#tab/powershell)
112+
### [PowerShell](#tab/azure-powershell)
113113

114114
N/A
115115

includes/storage-customer-managed-keys-change-include.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,15 +14,15 @@ ms.custom: "include file"
1414

1515
You can change the key that you are using for Azure Storage encryption at any time.
1616

17-
# [Azure portal](#tab/portal)
17+
# [Azure portal](#tab/azure-portal)
1818

1919
To change the key with the Azure portal, follow these steps:
2020

2121
1. Navigate to your storage account and display the **Encryption** settings.
2222
1. Select the key vault and choose a new key.
2323
1. Save your changes.
2424

25-
# [PowerShell](#tab/powershell)
25+
# [PowerShell](#tab/azure-powershell)
2626

2727
To change the key with PowerShell, call [Set-AzStorageAccount](/powershell/module/az.storage/set-azstorageaccount) and provide the new key name and version. If the new key is in a different key vault, then you must also update the key vault URI.
2828

includes/storage-customer-managed-keys-disable-include.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,14 +14,14 @@ ms.custom: "include file"
1414

1515
When you disable customer-managed keys, your storage account is once again encrypted with Microsoft-managed keys.
1616

17-
# [Azure portal](#tab/portal)
17+
# [Azure portal](#tab/azure-portal)
1818

1919
To disable customer-managed keys in the Azure portal, follow these steps:
2020

2121
1. Navigate to your storage account and display the **Encryption** settings.
2222
1. Deselect the checkbox next to the **Use your own key** setting.
2323

24-
# [PowerShell](#tab/powershell)
24+
# [PowerShell](#tab/azure-powershell)
2525

2626
To disable customer-managed keys with PowerShell, call [Set-AzStorageAccount](/powershell/module/az.storage/set-azstorageaccount) with the `-StorageEncryption` option, as shown in the following example. Remember to replace the placeholder values in brackets with your own values and to use the variables defined in the previous examples.
2727

includes/storage-customer-managed-keys-key-vault-add-key-include.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,11 +16,11 @@ Next, add a key to the key vault.
1616

1717
Azure Storage encryption supports RSA and RSA-HSM keys of sizes 2048, 3072 and 4096. For more information about supported key types, see [About keys](../articles/key-vault/keys/about-keys.md).
1818

19-
# [Azure portal](#tab/portal)
19+
# [Azure portal](#tab/azure-portal)
2020

2121
To learn how to add a key with the Azure portal, see [Quickstart: Set and retrieve a key from Azure Key Vault using the Azure portal](../articles/key-vault/keys/quick-create-portal.md).
2222

23-
# [PowerShell](#tab/powershell)
23+
# [PowerShell](#tab/azure-powershell)
2424

2525
To add a key with PowerShell, call [Add-AzKeyVaultKey](/powershell/module/az.keyvault/add-azkeyvaultkey). Remember to replace the placeholder values in brackets with your own values and to use the variables defined in the previous examples.
2626

includes/storage-customer-managed-keys-key-vault-configure-include.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ You can use a new or existing key vault to store customer-managed keys. The stor
1616

1717
Using customer-managed keys with Azure Storage encryption requires that both soft delete and purge protection be enabled for the key vault. Soft delete is enabled by default when you create a new key vault and cannot be disabled. You can enable purge protection either when you create the key vault or after it is created.
1818

19-
# [Azure portal](#tab/portal)
19+
# [Azure portal](#tab/azure-portal)
2020

2121
To learn how to create a key vault with the Azure portal, see [Quickstart: Create a key vault using the Azure portal](../articles/key-vault/general/quick-create-portal.md). When you create the key vault, select **Enable purge protection**, as shown in the following image.
2222

@@ -28,7 +28,7 @@ To enable purge protection on an existing key vault, follow these steps:
2828
1. Under **Settings**, choose **Properties**.
2929
1. In the **Purge protection** section, choose **Enable purge protection**.
3030

31-
# [PowerShell](#tab/powershell)
31+
# [PowerShell](#tab/azure-powershell)
3232

3333
To create a new key vault with PowerShell, install version 2.0.0 or later of the [Az.KeyVault](https://www.powershellgallery.com/packages/Az.KeyVault/2.0.0) PowerShell module. Then call [New-AzKeyVault](/powershell/module/az.keyvault/new-azkeyvault) to create a new key vault. With version 2.0.0 and later of the Az.KeyVault module, soft delete is enabled by default when you create a new key vault.
3434

includes/storage-customer-managed-keys-revoke-include.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,11 +14,11 @@ ms.custom: "include file"
1414

1515
Revoking a customer-managed key removes the association between the storage account and the key vault.
1616

17-
# [Azure portal](#tab/portal)
17+
# [Azure portal](#tab/azure-portal)
1818

1919
To revoke customer-managed keys with the Azure portal, disable the key as described in [Disable customer-managed keys](#disable-customer-managed-keys).
2020

21-
# [PowerShell](#tab/powershell)
21+
# [PowerShell](#tab/azure-powershell)
2222

2323
You can revoke customer-managed keys by removing the key vault access policy. To revoke a customer-managed key with PowerShell, call the [Remove-AzKeyVaultAccessPolicy](/powershell/module/az.keyvault/remove-azkeyvaultaccesspolicy) command, as shown in the following example. Remember to replace the placeholder values in brackets with your own values and to use the variables defined in the previous examples.
2424

0 commit comments

Comments
 (0)