Skip to content

Commit 6d9de33

Browse files
authored
Merge pull request #114400 from alkohli/dbcmk
Data Box Customer managed key - go live 5/11
2 parents f5ae64c + ef66607 commit 6d9de33

15 files changed

+119
-1
lines changed

articles/databox/TOC.yml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,8 @@
5656
href: data-box-portal-admin.md
5757
- name: Manage via local web UI
5858
href: data-box-local-web-ui-admin.md
59+
- name: Enable customer managed key
60+
href: data-box-customer-managed-encryption-key-portal.md
5961
- name: Move data to a blob tier
6062
href: data-box-how-to-set-data-tier.md
6163
- name: Cable the device
@@ -115,7 +117,7 @@
115117
- name: How to
116118
items:
117119
- name: Manage via Azure portal
118-
href: data-box-portal-ui-admin.md
120+
href: data-box-portal-ui-admin.md
119121
- name: Troubleshoot
120122
items:
121123
- name: Unlock issues
@@ -175,6 +177,8 @@
175177
href: data-box-portal-admin.md
176178
- name: Manage via local web UI
177179
href: data-box-local-web-ui-admin.md
180+
- name: Enable customer managed key
181+
href: data-box-customer-managed-encryption-key-portal.md
178182
- name: Troubleshoot device issues
179183
href: data-box-troubleshoot.md
180184
- name: Move data to a blob tier
Lines changed: 114 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,114 @@
1+
---
2+
title: Use the Azure portal to configure customer-managed keys for Azure Data Box
3+
description: Learn how to use the Azure portal to configure customer-managed keys with Azure Key Vault for Azure Data Box. Customer-managed keys enable you to create, rotate, disable, and revoke access controls.
4+
services: databox
5+
author: alkohli
6+
ms.service: databox
7+
ms.topic: how-to
8+
ms.date: 05/07/2020
9+
ms.author: alkohli
10+
ms.subservice: pod
11+
---
12+
13+
# Use customer-managed keys in Azure Key Vault for Azure Data Box
14+
15+
Azure Data Box protects the device unlock key (also known as device password) that is used to lock the device via an encryption key. By default, device unlock key for a Data Box order is encrypted with a Microsoft managed key. For additional control over device unlock key, you can also provide a customer-managed key.
16+
17+
Customer-managed keys must be created and stored in an Azure Key Vault. For more information about Azure Key Vault, see [What is Azure Key Vault?](../key-vault/general/overview.md).
18+
19+
This article shows how to use customer-managed keys with Azure Data Box in the [Azure portal](https://portal.azure.com/). This article applies to both Azure Data Box devices and Azure Data Box Heavy devices.
20+
21+
## Prerequisites
22+
23+
Before you begin, make sure:
24+
25+
1. You have created an Azure Data Box order as per the instructions in [Tutorial: Order Azure Data Box](data-box-deploy-ordered.md).
26+
27+
2. You have an existing Azure Key Vault with a key in it that you can use to protect your device unlock key. To learn how to create a key vault using the Azure portal, see [Quickstart: Set and retrieve a secret from Azure Key Vault using the Azure portal](../key-vault/secrets/quick-create-portal.md).
28+
29+
- **Soft delete** and **Do not purge** are set on your existing key vault. These properties are not enabled by default. To enable these properties, see the sections titled **Enabling soft-delete** and **Enabling Purge Protection** in one of the following articles:
30+
31+
- [How to use soft-delete with PowerShell](../key-vault/general/soft-delete-powershell.md).
32+
- [How to use soft-delete with CLI](../key-vault/general/soft-delete-cli.md).
33+
- The existing key vault should have an RSA key of 2048 size or more. For more information about keys, see [About Azure Key Vault keys](../key-vault/keys/about-keys.md).
34+
- Key vault must be in the same region as the storage accounts used for your data. Multiple storage accounts can be linked with your Azure Data Box resource.
35+
- If you don't have an existing key vault, you can also create it inline as described in the following section.
36+
37+
## Enable keys
38+
39+
Configuring customer-managed key for your Azure Data Box is optional. By default, Data Box uses a Microsoft managed key to protect your BitLocker key. To enable a customer-managed key in the Azure portal, follow these steps:
40+
41+
1. Go to the **Overview** blade for your Data Box order.
42+
43+
![Overview blade of Data Box order](./media/data-box-customer-managed-encryption-key-portal/customer-managed-key-1.png)
44+
45+
2. Go to **Settings > Encryption**. Under **Encryption type**, you can choose how you want to protect your device unlock key. By default, a Microsoft managed key is used to protect your device unlock password.
46+
47+
![Choose encryption option](./media/data-box-customer-managed-encryption-key-portal/customer-managed-key-2.png)
48+
49+
3. Select encryption type as **Customer managed key**. After you have selected the customer-managed key, **Select a key vault and key**.
50+
51+
![Select customer-managed key](./media/data-box-customer-managed-encryption-key-portal/customer-managed-key-3.png)
52+
53+
5. In the **Select key from Azure Key Vault** blade, the subscription is automatically populated. For **Key vault**, you can select an existing key vault from the dropdown list.
54+
55+
![Create new Azure Key Vault](./media/data-box-customer-managed-encryption-key-portal/customer-managed-key-31.png)
56+
57+
You can also select **Create new** to create a new key vault. In the **Create key vault blade**, enter the resource group and the key vault name. Ensure that the **Soft delete** and **Purge protection** are enabled. Accept all other defaults. Select **Review + Create**.
58+
59+
![Create new Azure Key Vault](./media/data-box-customer-managed-encryption-key-portal/customer-managed-key-4.png)
60+
61+
7. Review the information associated with your key vault and select **Create**. Wait for a couple minutes for the key vault creation to complete.
62+
63+
![Create Azure Key Vault](./media/data-box-customer-managed-encryption-key-portal/customer-managed-key-5.png)
64+
65+
8. In the **Select key from Azure Key Vault**, you can select a key in the existing key vault.
66+
67+
![Create new key in Azure Key Vault](./media/data-box-customer-managed-encryption-key-portal/customer-managed-key-6.png)
68+
69+
9. If you want to create a new key, select **Create new** to create a key. RSA key size can be 2048 or greater.
70+
71+
![Create new key in Azure Key Vault](./media/data-box-customer-managed-encryption-key-portal/customer-managed-key-61.png)
72+
73+
10. Provide the name for your key, accept the other defaults, and select **Create**.
74+
75+
![Create new key](./media/data-box-customer-managed-encryption-key-portal/customer-managed-key-7.png)
76+
77+
78+
11. You are notified that a key is created in your key vault. Select the **Version** and then choose **Select**.
79+
80+
![New key created in key vault](./media/data-box-customer-managed-encryption-key-portal/customer-managed-key-8.png)
81+
82+
12. In the **Encryption type** pane, you can see the key vault and the key selected for your customer-managed key.
83+
84+
![Key and key vault for customer-managed key](./media/data-box-customer-managed-encryption-key-portal/customer-managed-key-9.png)
85+
86+
13. Save the key.
87+
88+
![Save customer-managed key](./media/data-box-customer-managed-encryption-key-portal/customer-managed-key-10.png)
89+
90+
The key URL is displayed under **Encryption type**.
91+
92+
![Customer-managed key URL](./media/data-box-customer-managed-encryption-key-portal/customer-managed-key-11.png)
93+
94+
> [!IMPORTANT]
95+
> You can disable Microsoft managed key and move to customer-managed key at any stage of the Data Box order. However, once you have created the customer-managed key, you cannot switch back to the Microsoft-managed key.
96+
97+
## Troubleshoot errors
98+
99+
If you receive any errors related to your customer-managed key, use the following table to troubleshoot.
100+
101+
| Error code| Error message| Details|
102+
|-------------|--------------|---------|
103+
| SsemUserErrorEncryptionKeyDisabled| Could not fetch the passkey as the customer managed key is disabled.| Yes, by enabling the key version.|
104+
| SsemUserErrorEncryptionKeyExpired| Could not fetch the passkey as the customer managed key has expired.| Yes, by enabling the key version.|
105+
| SsemUserErrorKeyDetailsNotFound| Could not fetch the passkey as the customer managed key could not be found.| If you deleted the key vault, you can't recover the customer-managed key. If you migrated the key vault to a different tenant, see [Change a key vault tenant ID after a subscription move](https://docs.microsoft.com/azure/key-vault/key-vault-subscription-move-fix). If you deleted the key vault:<ol><li>Yes, if it is in the purge-protection duration, using the steps at [Recover a key vault](https://docs.microsoft.com/azure/key-vault/general/soft-delete-powershell#recovering-a-key-vault).</li><li>No, if it is beyond the purge-protection duration.</li></ol><br>Else if the key vault underwent a tenant migration, yes, it can be recovered using one of the below steps: <ol><li>Revert the key vault back to the old tenant.</li><li>Set `Identity = None` and then set the value back to `Identity = SystemAssigned`. This deletes and recreates the identity once the new identity has been created. Enable `Get`, `Wrap`, and `Unwrap` permissions to the new identity in the key vault's Access policy.</li></ol> |
106+
| SsemUserErrorKeyVaultBadRequestException| Could not fetch the passkey as the customer managed key access is revoked.| Yes, check if: <ol><li>Key vault still has the MSI in the access policy.</li><li>Access policy provides permissions to Get, Wrap, Unwrap.</li><li>If key vault is in a vNet behind the firewall, check if **Allow Microsoft Trusted Services** is enabled.</li></ol>|
107+
| SsemUserErrorKeyVaultDetailsNotFound| Could not fetch the passkey as the associated key vault for the customer managed key could not be found. | If you deleted the key vault, you can't recover the customer-managed key. If you migrated the key vault to a different tenant, see [Change a key vault tenant ID after a subscription move](https://docs.microsoft.com/azure/key-vault/key-vault-subscription-move-fix). If you deleted the key vault:<ol><li>Yes, if it is in the purge-protection duration, using the steps at [Recover a key vault](https://docs.microsoft.com/azure/key-vault/general/soft-delete-powershell#recovering-a-key-vault).</li><li>No, if it is beyond the purge-protection duration.</li></ol><br>Else if the key vault underwent a tenant migration, yes, it can be recovered using one of the below steps: <ol><li>Revert the key vault back to the old tenant.</li><li>Set `Identity = None` and then set the value back to `Identity = SystemAssigned`. This deletes and recreates the identity once the new identity has been created. Enable `Get`, `Wrap`, and `Unwrap` permissions to the new identity in the key vault's Access policy.</li></ol> |
108+
| SsemUserErrorSystemAssignedIdentityAbsent | Could not fetch the passkey as the customer managed key could not be found.| Yes, check if: <ol><li>Key vault still has the MSI in the access policy.</li><li>Identity is of type System assigned.</li><li>Enable Get, Wrap and Unwrap permissions to the identity in the key vault’s Access policy.</li></ol>|
109+
| Generic error | Could not fetch the passkey.| This is a generic error. Contact Microsoft Support to troubleshoot the error and determine the next steps.|
110+
111+
112+
## Next steps
113+
114+
- [What is Azure Key Vault](https://docs.microsoft.com/azure/key-vault/key-vault-overview)?
148 KB
Loading
137 KB
Loading
114 KB
Loading
120 KB
Loading
130 KB
Loading
46.7 KB
Loading
168 KB
Loading
145 KB
Loading

0 commit comments

Comments
 (0)