You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/key-vault/managed-hsm/disaster-recovery-guide.md
+15-7Lines changed: 15 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -74,23 +74,31 @@ At this point in the normal creation process, we initialize and download the new
74
74
az keyvault security-domain init-recovery --hsm-name ContosoMHSM2 --sd-exchange-key ContosoMHSM2-SDE.cer
75
75
```
76
76
77
-
## Upload Security Domain to destination HSM
77
+
## Create a Security Domain Upload blob of the source HSM
78
78
79
79
For this step you'll need:
80
80
- The Security Domain Exchange Key you downloaded in previous step.
81
81
- The Security Domain of the source HSM.
82
82
- At least quorum number of private keys that were used to encrypt the security domain.
83
83
84
-
The `az keyvault security-domain upload` command performs following operations:
84
+
The `az keyvault security-domain restore-blob` command performs following operations:
85
+
- Decrypt the source HSM's Security Domain with the private keys you supply.
86
+
- Create a Security Domain Upload blob encrypted with the Security Domain Exchange Key we downloaded in the previous step
85
87
86
-
- Decrypt the source HSM's Security Domain with the private keys you supply.
87
-
- Create a Security Domain Upload blob encrypted with the Security Domain Exchange Key we downloaded in the previous step and then
88
-
- Upload the Security Domain Upload blob to the HSM to complete security domain recovery
88
+
This step can be performed offline.
89
89
90
-
In the following example, we use the Security Domain from the **ContosoMHSM**, the 2 of the corresponding private keys, and upload it to **ContosoMHSM2**, which is waiting to receive a Security Domain.
90
+
In the following example, we use the Security Domain from the **ContosoMHSM**, the 3 of the corresponding private keys, and the Security Domain Exchange Key to create and download an encrypted blob which we will use to upload to **ContosoMHSM2**, which is waiting to receive a Security Domain.
## Upload Security Domain Upload blob to destination HSM
97
+
98
+
We now use the Security Domain Upload blob created in the previous step and upload it to the destination HSM to complete the security domain recovery. The `--restore-blob` flag is used to prevent exposing keys in an online environment.
az keyvault security-domain upload --hsm-name ContosoMHSM2 --sd-file restore_blob.json --restore-blob
94
102
```
95
103
96
104
Now both the source HSM (ContosoMHSM) and the destination HSM (ContosoMHSM2) have the same security domain. We can now restore a full backup from the source HSM into the destination HSM.
0 commit comments