You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/private-5g-core/collect-required-information-for-private-mobile-network.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,25 +42,25 @@ As part of creating your private mobile network, you can provision one or more S
42
42
43
43
If you want to provision SIMs as part of deploying your private mobile network:
44
44
45
-
1. Choose one of the following encryption types for for the new SIM group to which all of the SIMs you provision will be added:
45
+
1. Choose one of the following encryption types for the new SIM group to which all of the SIMs you provision will be added:
46
46
Note that once the SIM group is created, the encryption type cannot be changed.
47
-
- Microsoft-managed keys (MMK) that automatically renew when needed.
47
+
- Microsoft-managed keys (MMK) that Microsoft manages internally for [Encryption at rest](/azure/security/fundamentals/encryption-atrest).
48
48
- Customer-managed keys (CMK) that you must manually configure.
49
49
You must create a Key URI in your [Azure Key Vault](https://docs.microsoft.com/azure/key-vault/) and a [User-assigned identity](https://docs.microsoft.com/azure/active-directory/managed-identities-azure-resources/overview) with read, wrap, and unwrap access to the key.
50
-
- The key must be configured to have an activation and expiration date and we recommend that you enable automatic rotation for the key.
50
+
- The key must be configured to have an activation and expiration date and we recommend that you [configure cryptographic key auto-rotation in Azure Key Vault](https://learn.microsoft.com/azure/key-vault/keys/how-to-configure-key-rotation).
51
51
- The SIM group accesses the key via the user-assigned identity.
52
52
- For additional information on configuring CMK for a SIM group, see [Configure customer-managed keys](https://docs.microsoft.com/azure/cosmos-db/how-to-setup-cmk).
53
53
54
54
1. Collect each of the values given in the following table for the SIM group you want to provision.
55
55
56
-
|Value |Field name in Azure portal | JSON file parameter name |
57
-
|---------|---------|---------|
58
-
|The name for the SIM group resource. The name must only contain alphanumeric characters, dashes, and underscores. |**SIM group name**|`simGroupName`|
59
-
|The region that the SIM group belongs to.|**Region**|`simGroupRegion`|
60
-
|The mobile network that the SIM group belongs to.|**Mobile network**|`simGroupMobileNetwork`|
61
-
|The chosen encryption type for the SIM group. Microsoft-managed keys (MMK) by default, or customer-managed keys (CMK).|**Encryption Type**|`simGroupEncryption`|
62
-
|The Azure Key Vault URI containing the customer-managed Key for the SIM group.|**Key URI**|`simGroupKeyURI`|
63
-
|The User-assigned identity for accessing the SIM group's customer-managed Key within the Azure Key Vault.|**User-assigned identity**|`simGroupUserAssignedIdentity`|
56
+
|Value |Field name in Azure portal |
57
+
|---------|---------|
58
+
|The name for the SIM group resource. The name must only contain alphanumeric characters, dashes, and underscores. |**SIM group name**|
59
+
|The region that the SIM group belongs to.|**Region**|
60
+
|The mobile network that the SIM group belongs to.|**Mobile network**|
61
+
|The chosen encryption type for the SIM group. Microsoft-managed keys (MMK) by default, or customer-managed keys (CMK).|**Encryption Type**|
62
+
|The Azure Key Vault URI containing the customer-managed Key for the SIM group.|**Key URI**|
63
+
|The User-assigned identity for accessing the SIM group's customer-managed Key within the Azure Key Vault.|**User-assigned identity**|
64
64
65
65
1. Choose one of the following methods for provisioning your SIMs:
Copy file name to clipboardExpand all lines: articles/private-5g-core/security.md
+5-7Lines changed: 5 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,14 +30,12 @@ Azure Private 5G Core packet core instances are deployed on Azure Stack Edge dev
30
30
31
31
## Customer-managed key encryption at rest
32
32
33
-
In addition to Platform-Managed Keys, you have the option of using MicrosoftManaged Keys (MMK) or Customer Managed Keys (CMK) when [creating a SIM group](manage-sim-groups.md#create-a-sim-group) or [when deploying a private mobile network](how-to-guide-deploy-a-private-mobile-network-azure-portal.md#deploy-your-private-mobile-network).
33
+
In addition to the default [Encryption at rest](#encryption-at-rest)using Microsoft-Managed Keys (MMK), you can optionally use Customer Managed Keys (CMK) when [creating a SIM group](manage-sim-groups.md#create-a-sim-group) or [when deploying a private mobile network](how-to-guide-deploy-a-private-mobile-network-azure-portal.md#deploy-your-private-mobile-network) to encrypt data with your own key.
34
34
35
-
If you elect to use a CMK, you will need to:
36
-
37
-
-[create the CMK](https://learn.microsoft.com/azure/cosmos-db/how-to-setup-customer-managed-keys) with activation and expiration dates and make a note of the key's URI,
38
-
- and [create a user-assigned identity](https://learn.microsoft.com/azure/active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities?pivots=identity-mi-methods-azp) with read, wrap, and unwrap access to the key within your [Azure Key Vault](https://docs.microsoft.com/azure/key-vault/).
39
-
40
-
Additionally, we recommend that you [configure cryptographic key auto-rotation in Azure Key Vault](https://learn.microsoft.com/azure/key-vault/keys/how-to-configure-key-rotation).
35
+
If you elect to use a CMK, you will need to create a Key URI in your [Azure Key Vault](https://docs.microsoft.com/azure/key-vault/) and a [User-assigned identity](https://docs.microsoft.com/azure/active-directory/managed-identities-azure-resources/overview) with read, wrap, and unwrap access to the key.
36
+
- The key must be configured to have an activation and expiration date and we recommend that you [configure cryptographic key auto-rotation in Azure Key Vault](https://learn.microsoft.com/azure/key-vault/keys/how-to-configure-key-rotation).
37
+
- The SIM group accesses the key via the user-assigned identity.
38
+
- For additional information on configuring CMK for a SIM group, see [Configure customer-managed keys](https://docs.microsoft.com/azure/cosmos-db/how-to-setup-cmk).
41
39
42
40
> [!IMPORTANT]
43
41
> Once a SIM group is created, you cannot change the encryption type. However, if the SIM group uses CMK, you can update the key used for encryption.
0 commit comments