You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/configure-customer-managed-keys.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ The following diagram demonstrates how customer-managed keys work with Azure Net
23
23
3. You use the managed identity to which the Azure Key Vault admin granted permissions in step 1 to authenticate access to Azure Key Vault via Microsoft Entra ID.
24
24
4. Azure NetApp Files wraps the account encryption key with the customer-managed key in Azure Key Vault.
25
25
26
-
Customer-managed keys have no performance impact on Azure NetApp Files. Its only difference from platform-managed keys is how the key is managed.
26
+
Customer-managed keys don't affect performance of Azure NetApp Files. Its only difference from platform-managed keys is how the key is managed.
27
27
1. For read/write operations, Azure NetApp Files sends requests to Azure Key Vault to unwrap the account encryption key to perform encryption and decryption operations.
28
28
29
29
## Considerations
@@ -96,7 +96,7 @@ Before creating your first customer-managed key volume, you must set up:
96
96
* The key vault must have soft delete and purge protection enabled.
97
97
* The key must be of type RSA.
98
98
* The key vault must have an [Azure Private Endpoint](../private-link/private-endpoint-overview.md).
99
-
* The private endpoint must reside in a different subnet than the one delegated to Azure NetApp Files. The subnet must be in the same VNet as the one delegated to Azure NetApp.
99
+
* The private endpoint must reside in a different subnet than the one delegated to Azure NetApp Files. The subnet must be in the same virtual network as the one delegated to Azure NetApp.
100
100
101
101
For more information about Azure Key Vault and Azure Private Endpoint, see:
102
102
*[Quickstart: Create a key vault ](/azure/key-vault/general/quick-create-portal)
@@ -138,7 +138,7 @@ For more information about Azure Key Vault and Azure Private Endpoint, see:
138
138
*`Microsoft.KeyVault/vaults/keys/read`
139
139
*`Microsoft.KeyVault/vaults/keys/encrypt/action`
140
140
*`Microsoft.KeyVault/vaults/keys/decrypt/action`
141
-
The user-assigned identity you select is added to your NetApp account. Due to the customizable nature of role-based access control (RBAC), the Azure portal doesn't configure access to the key vault. See [Provide access to Key Vault keys, certificates, and secrets with an Azure role-based access control](/azure/key-vault/general/rbac-guide) for details on configuring Azure Key Vault.
141
+
The user-assigned identity you select is added to your NetApp account. Due to the customizable nature of role-based access control, the Azure portal doesn't configure access to the key vault. See [Provide access to Key Vault keys, certificates, and secrets with an Azure role-based access control](/azure/key-vault/general/rbac-guide) for details on configuring Azure Key Vault.
142
142
143
143
1. Select **Save** then observe the notification communicating the status of the operation. If the operation isn't successful, an error message displays. For assistance in resolving the error, see [error messages and troubleshooting](troubleshoot-customer-managed-keys.md).
144
144
@@ -338,7 +338,7 @@ You can use an Azure Key Vault that is configured to use Azure role-based access
338
338
339
339
1. Once the custom role is created and available to use with the key vault, you apply it to the user-assigned identity.
340
340
341
-
:::image type="content" source="./media/configure-customer-managed-keys/rbac-review-assign.png" alt-text="Screenshot of RBAC review and assign menu." lightbox="./media/configure-customer-managed-keys/rbac-review-assign.png":::
341
+
:::image type="content" source="./media/configure-customer-managed-keys/rbac-review-assign.png" alt-text="Screenshot of role-based access control review and assign menu." lightbox="./media/configure-customer-managed-keys/rbac-review-assign.png":::
342
342
343
343
## Create an Azure NetApp Files volume using customer-managed keys
344
344
@@ -352,7 +352,7 @@ You can use an Azure Key Vault that is configured to use Azure role-based access
352
352
353
353
When you create a volume using a customer-managed key, you must also select **Standard** for the **Network features** option. Basic network features are not supported.
354
354
355
-
You must select a key vault private endpoint as well. The dropdown menu displays private endpoints in the selected virtual network (VNet). If there's no private endpoint for your key vault in the selected VNet, then the dropdown is empty, and you won't be able to proceed. If you encounter this scenario, see [Azure Private Endpoint](../private-link/private-endpoint-overview.md).
355
+
You must select a key vault private endpoint as well. The dropdown menu displays private endpoints in the selected virtual network. If there's no private endpoint for your key vault in the selected virtual network, then the dropdown is empty, and you won't be able to proceed. If you encounter this scenario, see [Azure Private Endpoint](../private-link/private-endpoint-overview.md).
356
356
357
357
:::image type="content" source="./media/configure-customer-managed-keys/keys-create-volume.png" alt-text="Screenshot of create volume menu." lightbox="./media/configure-customer-managed-keys/keys-create-volume.png":::
358
358
@@ -381,7 +381,7 @@ Encryption key transition for Azure NetApp Files is currently in preview. Before
> The **RegistrationState** may be in the `Registering` state for up to 60 minutes before changing to `Registered`. Wait until the status is **Registered** before continuing.
384
+
> The **RegistrationState** can remain in the `Registering` state for up to 60 minutes before changing to `Registered`. Wait until the status is **Registered** before continuing.
385
385
386
386
You can also use [Azure CLI commands](/cli/azure/feature) `az feature register` and `az feature show` to register the feature and display the registration status.
387
387
@@ -407,7 +407,7 @@ If you have already configured your NetApp account for customer-managed keys and
407
407
1. In the **Rekey** menu, select one of the available keys from the dropdown menu. The chosen key must be different from the current key.
408
408
:::image type="content" source="./media/configure-customer-managed-keys/encryption-rekey.png" alt-text="Screenshot of the rekey menu." lightbox="./media/configure-customer-managed-keys/encryption-rekey.png":::
409
409
410
-
1. Select **OK** to save. The rekey operation may take several minutes.
410
+
1. Select **OK** to save. The rekey operation can take several minutes.
411
411
412
412
## Switch from system-assigned to user-assigned identity
0 commit comments