You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Cross-tenant customer-managed keys (CMK) for Azure NetApp Files volume encryption allows service providers based on Azure to offer [customer-managed key encryption](configure-customer-managed-keys.md). In the cross-tenant scenario, the NetApp account resides in a tenant managed by an independent software vendor (ISV), while the key used for encryption of volumes in that NetApp account resides in a key vault in a tenant that you manage.
15
+
Cross-tenant customer-managed keys (CMK) for Azure NetApp Files volume encryption allows service providers based on Azure to offer [customer-managed key encryption](configure-customer-managed-keys.md). In the cross-tenant scenario, the NetApp account resides in a tenant managed by an independent software vendor, while the key used for encryption of volumes in that NetApp account resides in a key vault in a tenant that you manage.
16
16
17
17
## Understand cross-tenant customer-managed keys
18
18
@@ -22,7 +22,7 @@ The following diagram illustrates a sample cross-tenant CMK configuration. In th
22
22
23
23
A multitenant application registration is created by the service provider in Tenant 1. A [federated identity credential](/entra/workload-id/workload-identity-federation-create-trust?pivots=identity-wif-apps-methods-azp) is created on this application using a user-assigned managed identity along with a private endpoint to the key vault. Then, the name and application ID of the app are shared.
24
24
25
-
Following these steps, you install the service provider's application in your tenant (tenant 2) and grant the service principal associated with the installed application access to the key vault. You also store the encryption key (that is, the customer-managed key) in the key vault. You also shares the key location (the URI of the key) with the service provider. Following configuration, the service provider has:
25
+
Following these steps, you install the service provider's application in your tenant (tenant 2) then grant the service principal associated with the installed application access to the key vault. You also store the encryption key (that is, the customer-managed key) in the key vault. You also share the key location (the URI of the key) with the service provider. Following configuration, the service provider has:
26
26
27
27
- An application ID for a multitenant application installed in the customer's tenant, which has been granted access to the customer-managed key.
28
28
- A managed identity configured as the credential on the multitenant application.
@@ -89,14 +89,14 @@ Cross-tenant CMK is currently only supported for the REST API.
89
89
## Configure a NetApp account to use a key from a vault in another tenant.
90
90
91
91
1. Create the application registration.
92
-
1. Navigate to Microsoft Entra ID in the Azure Portal
92
+
1. Navigate to Microsoft Entra ID in the Azure portal
93
93
1. Select **Manage > App registrations** from the left pane.
94
94
1. Select **+ New registration**.
95
95
1. Provide the name for the application registration then select **Account** in any organizational directory.
96
96
1. Select **Register**.
97
97
1. Take note of the ApplicationID/ClientID of the application.
98
98
1. Create a user-assigned managed identity.
99
-
1. Navigate to Managed Identities in the Azure Portal.
99
+
1. Navigate to Managed Identities in the Azure portal.
100
100
1. Select **+ Create**.
101
101
1. Provide the resource group, region, and name for the managed identity.
102
102
1. Select **Review + create**.
@@ -110,22 +110,22 @@ Cross-tenant CMK is currently only supported for the REST API.
110
110
1. Under Federated credential scenario, select **Customer Managed Keys**.
111
111
1. Choose **Select a managed identity**. From the pane, select the subscription. Under **Managed identity**, select **User-assigned managed identity**. In the Select box, search for the managed identity you created earlier, then choose **Select** at the bottom of the pane.
112
112
1. Under Credential details, provide a name and optional description for the credential. Select **Add**.
113
-
1. Create a private endpoint to the your key vault:
113
+
1. Create a private endpoint to your key vault:
114
114
1. Have the customer share the full Azure ResourceId of their Key Vault. <!-- huh? -->
115
115
1. Navigate to **Private Endpoints**.
116
116
1. Select **+ Create**.
117
117
1. Choose your subscription and resource group, and enter a name for the Private Endpoint, then select **Next > Resource**.
118
118
1. In the Resource tab, enter the following:
119
119
- Under Connection Method, select **Connect to an Azure resource by resource ID or alias**.
120
120
- Under **Resource ID or alias**, enter the ResourceID of the customer’s key vault.
121
-
- Under target sub-resource enter “vault”. Then select **Next > Virtual Network**.
121
+
- Under target subresource, enter "vault". Then select **Next > Virtual Network**.
122
122
1. In the Virtual Network tab, select a virtual network and subnet for the private endpoint. The endpoint must be in the same virtual network as the volumes you wish to create. The subnet must be a different subnet than the one delegated to `Microsoft.NetApp/volumes`.
123
123
1. Select Next on the next few tabs. Finally, select **Create** on the final tab.
124
124
125
125
### Authorize access to the key vault
126
126
127
127
1. Install the service provider application in the customer tenant
128
-
1. Get the Admin Consent URL from the provider for their cross-tenant application. In our example the URL would look like this: https://login.microsoftonline.com/<tenant1tenantId>/adminconsent/client_id=<client/application ID for the cross tenant-application> This opens a login page where you enter your credentials. Once you enter your credentials, you may see an error stating there is no redirect URL configured. This is OK.
128
+
1. Get the Admin Consent URL from the provider for their cross-tenant application. In our example the URL would look like this: https://login.microsoftonline.com/<tenant1tenantId>/adminconsent/client_id=<client/application ID for the cross tenant-application> This opens a login page where you enter your credentials. Once you enter your credentials, you may see an error stating there's no redirect URL configured. This is OK.
129
129
1. Grant the service provider application access to the key vault.
130
130
1. Navigate to your key vault. Select Access Control (IAM) from the left pane.
131
131
1. Under Grant access to this resource, select **Add role assignment**.
0 commit comments