You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/key-vault/managed-hsm/tls-offload-library.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -202,9 +202,9 @@ There are two approaches to generating a key and using the key for the Key Less
202
202
#### Granular approach
203
203
204
204
1. Create an Admin User (for example, TLSOffloadAdminUser) with the following role:
205
-
- "Managed HSM Crypto Officer" role at the "/" scope
205
+
- "Managed HSM Crypto Officer" role at the "/" scope
206
206
1. Create a Key Generation service principal (for example, TLSOffloadKeyGenServicePrincipal) for the TLS Offload Key generation and assign the following role:
207
-
- "Managed HSM Crypto User" role at the "/keys" scope.
207
+
- "Managed HSM Crypto User" role at the "/keys" scope.
208
208
1. Create a service principal for the TLS Offloading (for example, TLSOffload ServicePrincipal)
209
209
1. The Admin User creates the following custom role definition:
210
210
```azurecli
@@ -218,11 +218,11 @@ There are two approaches to generating a key and using the key for the Key Less
218
218
}'
219
219
```
220
220
1. Generate a key with required label following "How to generate keys using the TLS Offload Library". Use the Key Generation service principal (for example, TLSOffloadKeyGenServicePrincipal) while generating keys. Note down the Key Label and Key Name. For example:
221
-
- Key Label: tlsKey
222
-
- Key Name: p11-6a2155dc40c94367a0f97ab452dc216f
221
+
- Key Label: tlsKey
222
+
- Key Name: p11-6a2155dc40c94367a0f97ab452dc216f
223
223
1. Admin User assigns the following roles to the TLS Offload service principal
224
-
- "TLS Library User Read Role" role at the "/keys" scope
225
-
- "Managed HSM Crypto User" role at the "/keys/{key name}" scope
224
+
- "TLS Library User Read Role" role at the "/keys" scope
225
+
- "Managed HSM Crypto User" role at the "/keys/{key name}" scope
226
226
```azurecli
227
227
az keyvault role assignment create --hsm-name ContosoMHSM \
0 commit comments