You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Before you can create a container to upload the blob to, you'll need to assign the [Storage Blob Data Contributor](../../role-based-access-control/built-in-roles.md#storage-blob-data-contributor) role to yourself. For this example, the role will be assigned to the storage account you've made earlier.
42
42
43
43
```azurecli
44
-
az role assignment create --role "Storage Blob Data Contributor" --assignee [email protected] --scope "/subscriptions/aaaaaaaa-bbbb-bbbb-cccc-dddddddddddd/resourceGroups/contosoResourceGroup5/providers/Microsoft.Storage/storageAccounts/contosoblobstorage5
44
+
az role assignment create --role "Storage Blob Data Contributor" --assignee [email protected] --scope "/subscriptions/{subscription-id}/resourceGroups/contosoResourceGroup5/providers/Microsoft.Storage/storageAccounts/contosoblobstorage5
45
45
```
46
46
47
47
Now that you've assign the role to storage account, you can create a container for your blob.
Copy file name to clipboardExpand all lines: articles/key-vault/general/manage-with-cli2.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -205,16 +205,16 @@ az ad sp create-for-rbac -n "MyApp" --password "hVFkk965BuUv" --role Contributor
205
205
206
206
To authorize the application to access the key or secret in the vault, use the `az keyvault set-policy` command.
207
207
208
-
For example, if your vault name is ContosoKeyVault, the application has an appID of 8f8c4bbd-485b-45fd-98f7-ec6300b7b4ed, and you want to authorize the application to decrypt and sign with keys in your vault, use the following command:
208
+
For example, if your vault name is ContosoKeyVaultand you want to authorize the application to decrypt and sign with keys in your vault, use the following command with your application ID:
209
209
210
210
```azurecli
211
-
az keyvault set-policy --name "ContosoKeyVault" --spn 8f8c4bbd-485b-45fd-98f7-ec6300b7b4ed --key-permissions decrypt sign
211
+
az keyvault set-policy --name "ContosoKeyVault" --spn {application-id} --key-permissions decrypt sign
212
212
```
213
213
214
214
To authorize the same application to read secrets in your vault, type the following command:
215
215
216
216
```azurecli
217
-
az keyvault set-policy --name "ContosoKeyVault" --spn 8f8c4bbd-485b-45fd-98f7-ec6300b7b4ed --secret-permissions get
217
+
az keyvault set-policy --name "ContosoKeyVault" --spn {application-id} --secret-permissions get
Copy file name to clipboardExpand all lines: articles/key-vault/managed-hsm/backup-restore.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Full backup/restore and selective restore for Azure Managed HSM
3
-
description: This document explains full backup/restore and selective restore
3
+
description: This document explains full backup/restore and selective restore.
4
4
services: key-vault
5
5
author: mbaldwin
6
6
tags: azure-key-vault
@@ -26,8 +26,8 @@ Only following built-in roles have permission to perform full backup:
26
26
- Managed HSM Administrator
27
27
- Managed HSM Backup
28
28
29
-
There are 2 ways to execute a full backup/restore:
30
-
1. Assigning an User-Assigned Managed Identity (UAMI) to the Managed HSM service. You can backup and restore your MHSM using a user assigned managed identity regardless of whether your storage account has public network access or private network access enabled. If storage account is behind a private endpoint, the UAMI method works with trusted service bypass to allow for backup and restore.
29
+
There are two ways to execute a full backup/restore:
30
+
1. Assigning a User-Assigned Managed Identity (UAMI) to the Managed HSM service. You can back up and restore your MHSM using a user assigned managed identity regardless of whether your storage account has public network access or private network access enabled. If storage account is behind a private endpoint, the UAMI method works with trusted service bypass to allow for backup and restore.
31
31
2. Using storage container SAS token with permissions 'crdw'. Backing up and restoring using storage container SAS token requires your storage account to have public network access enabled.
32
32
33
33
You must provide the following information to execute a full backup:
@@ -43,8 +43,8 @@ You must provide the following information to execute a full backup:
43
43
1. Ensure you have the Azure CLI version 2.56.0 or later. Run `az --version` to find the version. If you need to install or upgrade, see [Install the Azure CLI](/cli/azure/install-azure-cli).
44
44
2. Create a user assigned managed identity.
45
45
3. Create a storage account (or use an existing storage account).
46
-
4. If public network access is diabled on your storage account, enable trusted service bypass on the storage account in the “Networking” tab, under “Exceptions.”
47
-
5. Provide ‘storage blob data contributor’ role access to the user assigned managed identity created in step#2. Do this by going to the “Access Control” tab on the portal -> Add Role Assignment. Then select “managed identity” and select the managed identity created in step#2 -> Review + Assign
46
+
4. If public network access is disabled on your storage account, enable trusted service bypass on the storage account in the “Networking” tab, under “Exceptions.”
47
+
5. Provide ‘storage blob data contributor’ role access to the user assigned managed identity created in step#2 by going to the “Access Control” tab on the portal -> Add Role Assignment. Then select “managed identity” and select the managed identity created in step#2 -> Review + Assign
48
48
6. Create the Managed HSM and associate the managed identity with below command.
@@ -56,7 +56,7 @@ You must provide the following information to execute a full backup:
56
56
57
57
## Full backup
58
58
59
-
Backup is a long running operation but will immediately return a Job ID. You can check the status of backup process using this Job ID. The backup process creates a folder inside the designated container with a following naming pattern **`mhsm-{HSM_NAME}-{YYYY}{MM}{DD}{HH}{mm}{SS}`**, where HSM_NAME is the name of managed HSM being backed up and YYYY, MM, DD, HH, MM, mm, SS are the year, month, date, hour, minutes, and seconds of date/time in UTC when the backup command was received.
59
+
Backup is a long running operation but immediately returns a Job ID. You can check the status of backup process using this Job ID. The backup process creates a folder inside the designated container with a following naming pattern **`mhsm-{HSM_NAME}-{YYYY}{MM}{DD}{HH}{mm}{SS}`**, where HSM_NAME is the name of managed HSM being backed up and YYYY, MM, DD, HH, MM, mm, SS are the year, month, date, hour, minutes, and seconds of date/time in UTC when the backup command was received.
60
60
61
61
While the backup is in progress, the HSM might not operate at full throughput as some HSM partitions will be busy performing the backup operation.
0 commit comments