Skip to content

Commit 6e93ea5

Browse files
Merge pull request #209983 from tamram/tamram22-0901
minor tweaks to xtenant CMK include files
2 parents 37c8438 + 7886d41 commit 6e93ea5

File tree

2 files changed

+8
-8
lines changed

2 files changed

+8
-8
lines changed

includes/active-directory-msi-cross-tenant-cmk-create-identities-authorize-key-vault.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
author: karavar
33
ms.author: vakarand
4-
ms.date: 08/23/2022
4+
ms.date: 09/01/2022
55
ms.service: active-directory
66
ms.subservice: managed-identity
77
ms.topic: include
@@ -35,7 +35,7 @@ To create a new registration:
3535
1. Select **Register**.
3636
1. Note the **ApplicationId/ClientId** of the application.
3737

38-
:::image type="content" source="media/active-directory-msi-cross-tenant-cmk-create-identities-authorize-key-vault/register-application.png" alt-text="Screen shot showing how to create a new multi-tenant application registration." lightbox="media/active-directory-msi-cross-tenant-cmk-create-identities-authorize-key-vault/register-application.png" border="true":::
38+
:::image type="content" source="media/active-directory-msi-cross-tenant-cmk-create-identities-authorize-key-vault/register-application.png" alt-text="Screen shot showing how to create a new multi-tenant application registration." lightbox="media/active-directory-msi-cross-tenant-cmk-create-identities-authorize-key-vault/register-application.png" border="true":::
3939

4040
#### The service provider creates a user-assigned managed identity
4141

@@ -49,7 +49,7 @@ Create a user-assigned managed identity to be used as a federated identity crede
4949

5050
`/subscriptions/tttttttt-0000-tttt-0000-tttt0000tttt/resourcegroups/XTCMKDemo/providers/Microsoft.ManagedIdentity/userAssignedIdentities/ConsotoCMKDemoUA`
5151

52-
:::image type="content" source="media/active-directory-msi-cross-tenant-cmk-create-identities-authorize-key-vault/create-user-assigned-managed-identity.png" alt-text="Screen shot showing how to create a resource group and a user-assigned managed identity." lightbox="media/active-directory-msi-cross-tenant-cmk-create-identities-authorize-key-vault/create-user-assigned-managed-identity.png" border="true":::
52+
:::image type="content" source="media/active-directory-msi-cross-tenant-cmk-create-identities-authorize-key-vault/create-user-assigned-managed-identity.png" alt-text="Screen shot showing how to create a resource group and a user-assigned managed identity." lightbox="media/active-directory-msi-cross-tenant-cmk-create-identities-authorize-key-vault/create-user-assigned-managed-identity.png" border="true":::
5353

5454
#### The service provider configures the user-assigned managed identity as a federated credential on the application
5555

@@ -232,7 +232,7 @@ To create the key vault, the user's account must be assigned the **Key Vault Con
232232
1. On the **Access policy** tab, select **Azure role-based access control** for **Permission model**.
233233
1. Select **Review + create** and then **Create**.
234234

235-
:::image type="content" source="media/active-directory-msi-cross-tenant-cmk-create-identities-authorize-key-vault/create-key-vault.png" alt-text="Screen shot showing how to create a key vault." lightbox="media/active-directory-msi-cross-tenant-cmk-create-identities-authorize-key-vault/create-key-vault.png" border="true":::
235+
:::image type="content" source="media/active-directory-msi-cross-tenant-cmk-create-identities-authorize-key-vault/create-key-vault.png" alt-text="Screen shot showing how to create a key vault." lightbox="media/active-directory-msi-cross-tenant-cmk-create-identities-authorize-key-vault/create-key-vault.png" border="true":::
236236

237237
Take note of the **Vault name** and **Vault URI**. Applications that access your key vault must use this URI.
238238

includes/active-directory-msi-cross-tenant-cmk-overview.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
author: karavar
33
ms.author: vakarand
4-
ms.date: 08/11/2022
4+
ms.date: 09/01/2022
55
ms.service: active-directory
66
ms.subservice: managed-identity
77
ms.topic: include
@@ -18,7 +18,7 @@ Azure platform services and resources that are owned by the service provider and
1818

1919
For the purposes of this how-to article, assume there are two Azure AD tenants: an independent service provider's tenant (*Tenant1*), and a customer's tenant (*Tenant2*). *Tenant1* hosts Azure platform services and *Tenant2* hosts the customer's key vault.
2020

21-
The service provider first creates a multi-tenant application registration in *Tenant1*. The service provider configures a [federated identity credential](/azure/active-directory/develop/workload-identity-federation-create-trust-managed-identity-as-credential) on this application using a user-assigned managed identity. The service provider then shares the name and application ID of the app with the customer.
21+
The service provider first creates a multi-tenant application registration in *Tenant1*. The service provider configures a [federated identity credential](../articles/active-directory/develop/workload-identity-federation-create-trust.md) on this application using a user-assigned managed identity. The service provider then shares the name and application ID of the app with the customer.
2222

2323
A user with the appropriate permissions installs the service provider's application in the customer tenant, *Tenant2*. A user then grants the service principal associated with the installed application access to the customer's key vault. The customer also stores the encryption key, or customer-managed key, in the key vault. The customer shares the key location (the URL of the key) with the service provider.
2424

@@ -68,6 +68,6 @@ Operations in Phase 1 would be a one-time setup for most service provider applic
6868
- Access to Azure Key Vault can be authorized using Azure RBAC or access policies. When granting access to a key vault, make sure to use the active mechanism for your key vault.
6969
- An Azure AD application registration has an application ID (client ID). When the application is installed in your tenant, a service principal is created. The service principal shares the same application ID as the app registration, but generates its own object ID. When you authorize the application to have access to resources, you may need to use the service principal `Name` or `ObjectID` property.
7070

71-
### Phase 3
71+
### Phase 3 - The service provider encrypts data in an Azure resource using the customer-managed key
7272

73-
After phase 1 and 2 are complete, the service provider can configure encryption on the Azure resource to work across tenants. You can do this using an ARM template or REST API.
73+
After phase 1 and 2 are complete, the service provider can configure encryption on the Azure resource with the key and key vault in the customer's tenant and the Azure resource in the ISV's tenant. The service provider can configure cross-tenant customer-managed keys with the Azure portal, PowerShell, or Azure CLI, with an ARM template, or with the REST API.

0 commit comments

Comments
 (0)