Skip to content

Commit 437e825

Browse files
authored
Merge pull request #115405 from ramankumarlive/patch-52
removed read permissions as now it is not required
2 parents c578359 + 022199b commit 437e825

File tree

1 file changed

+1
-8
lines changed

1 file changed

+1
-8
lines changed

articles/virtual-machines/windows/disk-encryption.md

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -88,9 +88,6 @@ For now, customer-managed keys have the following restrictions:
8888
1. Create an instance of Azure Key Vault and encryption key.
8989

9090
When creating the Key Vault instance, you must enable soft delete and purge protection. Soft delete ensures that the Key Vault holds a deleted key for a given retention period (90 day default). Purge protection ensures that a deleted key cannot be permanently deleted until the retention period lapses. These settings protect you from losing data due to accidental deletion. These settings are mandatory when using a Key Vault for encrypting managed disks.
91-
92-
> [!IMPORTANT]
93-
> Do not camel case the region, if you do so you may experience problems when assigning additional disks to the resource in the Azure portal.
9491

9592
```powershell
9693
$ResourceGroupName="yourResourceGroupName"
@@ -118,12 +115,8 @@ For now, customer-managed keys have the following restrictions:
118115
> [!NOTE]
119116
> It may take few minutes for Azure to create the identity of your DiskEncryptionSet in your Azure Active Directory. If you get an error like "Cannot find the Active Directory object" when running the following command, wait a few minutes and try again.
120117
121-
```powershell
122-
$identity = Get-AzADServicePrincipal -DisplayName myDiskEncryptionSet1
123-
118+
```powershell
124119
Set-AzKeyVaultAccessPolicy -VaultName $keyVaultName -ObjectId $des.Identity.PrincipalId -PermissionsToKeys wrapkey,unwrapkey,get
125-
126-
New-AzRoleAssignment -ResourceName $keyVaultName -ResourceGroupName $ResourceGroupName -ResourceType "Microsoft.KeyVault/vaults" -ObjectId $des.Identity.PrincipalId -RoleDefinitionName "Reader"
127120
```
128121
129122
#### Create a VM using a Marketplace image, encrypting the OS and data disks with customer-managed keys

0 commit comments

Comments
 (0)