Skip to content

Commit 3e1fc4c

Browse files
committed
acrolinx
1 parent cfcdebd commit 3e1fc4c

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/azure-netapp-files/customer-managed-keys-cross-tenant.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.author: anfdocs
1212

1313
# Configure cross-tenant customer-managed keys for Azure NetApp Files volume encryption (preview)
1414

15-
Cross-tenant customer-managed keys (CMK) for Azure NetApp Files volume encryption allows service providers based on Azure to offer [customer-managed key encryption](configure-customer-managed-keys.md). In the cross-tenant scenario, the NetApp account resides in a tenant managed by an independent software vendor (ISV), while the key used for encryption of volumes in that NetApp account resides in a key vault in a tenant that you manage.
15+
Cross-tenant customer-managed keys (CMK) for Azure NetApp Files volume encryption allows service providers based on Azure to offer [customer-managed key encryption](configure-customer-managed-keys.md). In the cross-tenant scenario, the NetApp account resides in a tenant managed by an independent software vendor, while the key used for encryption of volumes in that NetApp account resides in a key vault in a tenant that you manage.
1616

1717
## Understand cross-tenant customer-managed keys
1818

@@ -22,7 +22,7 @@ The following diagram illustrates a sample cross-tenant CMK configuration. In th
2222

2323
A multitenant application registration is created by the service provider in Tenant 1. A [federated identity credential](/entra/workload-id/workload-identity-federation-create-trust?pivots=identity-wif-apps-methods-azp) is created on this application using a user-assigned managed identity along with a private endpoint to the key vault. Then, the name and application ID of the app are shared.
2424

25-
Following these steps, you install the service provider's application in your tenant (tenant 2) and grant the service principal associated with the installed application access to the key vault. You also store the encryption key (that is, the customer-managed key) in the key vault. You also shares the key location (the URI of the key) with the service provider. Following configuration, the service provider has:
25+
Following these steps, you install the service provider's application in your tenant (tenant 2) then grant the service principal associated with the installed application access to the key vault. You also store the encryption key (that is, the customer-managed key) in the key vault. You also share the key location (the URI of the key) with the service provider. Following configuration, the service provider has:
2626

2727
- An application ID for a multitenant application installed in the customer's tenant, which has been granted access to the customer-managed key.
2828
- A managed identity configured as the credential on the multitenant application.
@@ -89,14 +89,14 @@ Cross-tenant CMK is currently only supported for the REST API.
8989
## Configure a NetApp account to use a key from a vault in another tenant.
9090

9191
1. Create the application registration.
92-
1. Navigate to Microsoft Entra ID in the Azure Portal
92+
1. Navigate to Microsoft Entra ID in the Azure portal
9393
1. Select **Manage > App registrations** from the left pane.
9494
1. Select **+ New registration**.
9595
1. Provide the name for the application registration then select **Account** in any organizational directory.
9696
1. Select **Register**.
9797
1. Take note of the ApplicationID/ClientID of the application.
9898
1. Create a user-assigned managed identity.
99-
1. Navigate to Managed Identities in the Azure Portal.
99+
1. Navigate to Managed Identities in the Azure portal.
100100
1. Select **+ Create**.
101101
1. Provide the resource group, region, and name for the managed identity.
102102
1. Select **Review + create**.
@@ -110,22 +110,22 @@ Cross-tenant CMK is currently only supported for the REST API.
110110
1. Under Federated credential scenario, select **Customer Managed Keys**.
111111
1. Choose **Select a managed identity**. From the pane, select the subscription. Under **Managed identity**, select **User-assigned managed identity**. In the Select box, search for the managed identity you created earlier, then choose **Select** at the bottom of the pane.
112112
1. Under Credential details, provide a name and optional description for the credential. Select **Add**.
113-
1. Create a private endpoint to the your key vault:
113+
1. Create a private endpoint to your key vault:
114114
1. Have the customer share the full Azure ResourceId of their Key Vault. <!-- huh? -->
115115
1. Navigate to **Private Endpoints**.
116116
1. Select **+ Create**.
117117
1. Choose your subscription and resource group, and enter a name for the Private Endpoint, then select **Next > Resource**.
118118
1. In the Resource tab, enter the following:
119119
- Under Connection Method, select **Connect to an Azure resource by resource ID or alias**.
120120
- Under **Resource ID or alias**, enter the ResourceID of the customer’s key vault.
121-
- Under target sub-resource enter vault. Then select **Next > Virtual Network**.
121+
- Under target subresource, enter "vault". Then select **Next > Virtual Network**.
122122
1. In the Virtual Network tab, select a virtual network and subnet for the private endpoint. The endpoint must be in the same virtual network as the volumes you wish to create. The subnet must be a different subnet than the one delegated to `Microsoft.NetApp/volumes`.
123123
1. Select Next on the next few tabs. Finally, select **Create** on the final tab.
124124

125125
### Authorize access to the key vault
126126

127127
1. Install the service provider application in the customer tenant
128-
1. Get the Admin Consent URL from the provider for their cross-tenant application. In our example the URL would look like this: https://login.microsoftonline.com/<tenant1 tenantId>/adminconsent/client_id=<client/application ID for the cross tenant-application> This opens a login page where you enter your credentials. Once you enter your credentials, you may see an error stating there is no redirect URL configured. This is OK.
128+
1. Get the Admin Consent URL from the provider for their cross-tenant application. In our example the URL would look like this: https://login.microsoftonline.com/<tenant1 tenantId>/adminconsent/client_id=<client/application ID for the cross tenant-application> This opens a login page where you enter your credentials. Once you enter your credentials, you may see an error stating there's no redirect URL configured. This is OK.
129129
1. Grant the service provider application access to the key vault.
130130
1. Navigate to your key vault. Select Access Control (IAM) from the left pane.
131131
1. Under Grant access to this resource, select **Add role assignment**.

0 commit comments

Comments
 (0)