You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/operator-nexus/howto-baremetal-functions.md
+15-3Lines changed: 15 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -155,13 +155,15 @@ Use the `replace` command when a server encounters hardware issues requiring a c
155
155
After the replacing components such as motherboard or Network Interface Card (NIC), the MAC address of Bare Metal Machine will change; however, the iDRAC IP address and hostname will remain the same.
156
156
A `replace`**must** be executed after each hardware maintenance operation, read through [Best practices for a Bare Metal Machine replace](./howto-bare-metal-best-practices.md#best-practices-for-a-bare-metal-machine-replace) for more details.
157
157
158
+
As of the 2506.2 release, the password value for iDRAC can be provided as a Key Vault Uniform Resource Identifier (URI) or password value. See [Key Vault Credential Reference](reference-key-vault-credential.md). Using a URI instead of a plaintext password provides extra security.
Message: BMC login unsuccessful: Fail - Unauthorized; System health test(s) failed: [Additional logs: Server power down at end of test failed with: Unauthorized]
183
195
```
184
196
185
-
**Example 2: hardware validation fails due to networking failure**
197
+
**Example 3: Hardware validation fails due to networking failure**
| AGGR_RACK_BMM | Used for single rack deployment only, empty for multi-rack |
128
128
| SA1_NAME | First Storage Appliance Device name |
129
129
| SA2_NAME | Second Storage Appliance Device name |
130
-
| SA1_PASS | First Storage Appliance admin password |
131
-
| SA2_PASS | Second Storage Appliance admin password |
130
+
| SA1_PASS | First Storage Appliance admin password reference URI or password value \*See [Key Vault Credential Reference](reference-key-vault-credential.md)|
131
+
| SA2_PASS | Second Storage Appliance admin password reference URI or password value \*See [Key Vault Credential Reference](reference-key-vault-credential.md)|
132
132
| SA_USER | Storage Appliance admin user |
133
133
| SA1_SN | First Storage Appliance Serial Number |
134
134
| SA2_SN | Second Storage Appliance Serial Number |
135
135
| COMPX_RACK_RESOURCE_ID | RackID for CompX Rack; repeat for each rack in compute-rack-definitions |
136
136
| COMPX_RACK_SKU | The Rack Stock Keeping Unit (SKU) for CompX Rack; repeat for each rack in compute-rack-definitions \*See [Operator Nexus Network Cloud Stock Keeping Unit (SKUs)](./reference-operator-nexus-skus.md)|
137
137
| COMPX_RACK_SN | Rack Serial Number for CompX Rack; repeat for each rack in compute-rack-definitions |
138
138
| COMPX_RACK_LOCATION | Rack physical location for CompX Rack; repeat for each rack in compute-rack-definitions |
139
-
| COMPX_SVRY_BMC_PASS | CompX Rack ServerY Baseboard Management Controller (BMC) password; repeat for each rack in compute-rack-definitions and for each server in rack |
139
+
| COMPX_SVRY_BMC_PASS | CompX Rack ServerY Baseboard Management Controller (BMC) password reference URI or password value; repeat for each rack in compute-rack-definitions and for each server in rack \*See [Key Vault Credential Reference](reference-key-vault-credential.md)|
140
140
| COMPX_SVRY_BMC_USER | CompX Rack ServerY BMC user; repeat for each rack in compute-rack-definitions and for each server in rack |
141
141
| COMPX_SVRY_BMC_MAC | CompX Rack ServerY BMC MAC address; repeat for each rack in compute-rack-definitions and for each server in rack |
142
142
| COMPX_SVRY_BOOT_MAC | CompX Rack ServerY boot Network Interface Card (NIC) MAC address; repeat for each rack in compute-rack-definitions and for each server in rack |
| TAG_VALUE1 | Optional tag1 value to pass to Cluster Create |
158
158
| TAG_KEY2 | Optional tag2 to pass to Cluster Create |
159
159
| TAG_VALUE2 | Optional tag2 value to pass to Cluster Create |
160
+
| ID_TYPE | See [Cluster Support for Managed Identities](./howto-cluster-managed-identity-user-provided-resources.md#key-vault-settings) for details on secret-archive-settings |
161
+
| VAULT_URI | See [Cluster Support for Managed Identities](./howto-cluster-managed-identity-user-provided-resources.md#key-vault-settings) for details on secret-archive-settings |
title: "Azure Operator Nexus: Password By Key Vault Reference"
3
+
description: Reference for using a key vault secret reference instead of a plaintext password
4
+
author: ghugo
5
+
ms.author: gagehugo
6
+
ms.service: azure-operator-nexus
7
+
ms.topic: how-to
8
+
ms.date: 05/20/2025
9
+
---
10
+
11
+
# Password by Key Vault reference
12
+
13
+
This guide details how to configure a Cluster for deployment using a Key Vault Uniform Resource Identifier (URI) instead of a plaintext password. This credential is used when creating or updating an Azure Operator cluster and can be located in the same key vault configured in `--secret-archive-settings` or a separate key vault. The key vault URI is used for deploying the cluster. Once the cluster is deployed, automatic credential rotation handles the rotation of the password.
14
+
15
+
This Key Vault URI is used to retrieve the password value from the specified Key Vault as a one-time operation. Once this password value is retrieved, the URI is no longer used and the password is securely stored in the cluster.
16
+
17
+
## Key Vault URI vs. Plaintext Password
18
+
19
+
Using a key vault URI instead of a password provides extra security by avoiding the issue of using a plaintext value. The URI value isn't used once the Cluster Create/Update & Bare Metal Machine Replace Actions are complete.
20
+
21
+
>[!NOTE]
22
+
> This feature is supported for cluster create and update as part of the 2506.2 release. A later release is planned to remove support for using plaintext passwords.
23
+
24
+
## Role Assignment
25
+
26
+
The managed identity that is specified in the `--secret-archive-settings` field needs to be assigned the `Key Vault Secrets User` role on the key vault that contains the password. The role assignment is required so that the cluster can retrieve the password value from the URI value referenced. The `Key Vault Secrets User` role assignment is different than `Operator Nexus Key Vault Writer Service Role`, which is required for the automatic rotation of credentials.
27
+
28
+
For more information on `--secret-archive-settings`, see [Cluster Support for Managed Identities](./howto-cluster-managed-identity-user-provided-resources.md#key-vault-settings).
29
+
30
+
## Configuration for Base Management Controller (BMC) and Storage Appliance
31
+
32
+
When a cluster is deployed, multiple passwords are provided as part of the configuration data. As of the 2506.2 release, the ability to pass in a URI reference value instead of a plaintext password was introduced.
33
+
34
+
In these examples, the `KEY_VAULT_NAME` is the name of the key vault and `SECRET_NAME` is the name of the secret. If there are multiple versions of a secret, the `VERSION` can be appended to specify that particular version should be used.
This key vault URI can also be provided for the password value when performing a bare metal machine replace: [Replace a Bare Metal Machine](./howto-baremetal-functions.md#replace-a-bare-metal-machine). The same [Role Assignment](#role-assignment) is needed to exist for this functionality to work.
0 commit comments