You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/operational-excellence/relocation-key-vault.md
+7-10Lines changed: 7 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ ms.custom: subject-relocation
16
16
17
17
Azure Key Vault doesn't support key vault relocation to another region.
18
18
19
-
Instead of relocation, you'll need to:
19
+
Instead of relocation, you need to:
20
20
21
21
- Create a new key vault with the relocation of the associated Azure services.
22
22
- Regenerate any required [keys](/azure/key-vault/keys/about-keys), [secrets](/azure/key-vault/secrets/about-secrets), or [certificates](/azure/key-vault/certificates/about-certificates). In some cases, you may need to transfer the secrets or certificates from your existing key vault to the relocated key vault.
@@ -25,8 +25,6 @@ Instead of relocation, you'll need to:
25
25
26
26
## Prerequisites
27
27
28
-
Here are some considerations and checks which need to be performed as prerequisites:
29
-
30
28
- Verify that your Azure subscription allows you to create Key Vaults in the target region. To enable the required quota, contact support.
31
29
- Create a dependency map with all the Azure services used by the Key Vault. For the services that are in scope of the relocation, you must elect the appropriate relocation strategy.
32
30
@@ -42,11 +40,10 @@ Here are some considerations and checks which need to be performed as prerequisi
42
40
43
41
## Consideration for Service Endpoints
44
42
45
-
The virtual network service endpoints for Azure Key Vault restrict access to a specified virtual network. The endpoints can also restrict access to a list of IPv4 (internet protocol version 4) address ranges. Any user connecting to the Key Vault from outside those sources is denied access. If Service endpoints were configured in the source region for the Key Vault resource, the same would need to be done in the target one. The steps for this scenario are mentioned below:
43
+
The virtual network service endpoints for Azure Key Vault restrict access to a specified virtual network. The endpoints can also restrict access to a list of IPv4 (internet protocol version 4) address ranges. Any user connecting to the Key Vault from outside those sources is denied access. If Service endpoints were configured in the source region for the Key Vault resource, the same would need to be done in the target one.
46
44
47
45
For a successful recreation of the Key Vault to the target region, the VNet and Subnet must be created beforehand. In case the move of these two resources is being carried out with the Azure Resource Mover tool, the service endpoints won’t be configured automatically. Hence, they need to be configured manually, which can be done through the [Azure portal](/azure/key-vault/general/quick-create-portal), the [Azure CLI](/azure/key-vault/general/quick-create-cli), or [Azure PowerShell](/azure/key-vault/general/quick-create-powershell).
48
46
49
-
Also, changes need to be made in the IaC of the Key Vault. In the `networkAcl` section, under _virtualNetworkRules_, add the rule for the target subnet. Ensure that the _ignoreMissingVnetServiceEndpoint_ flag is set to False, so that the IaC fails to deploy the Key Vault in case the service endpoint isn’t configured in the target region. This will ensure that the prerequisites in the target region are met.
50
47
51
48
## Consideration for Private Endpoint
52
49
@@ -122,7 +119,7 @@ Keep in mind the following concepts:
122
119
- Key vault names are globally unique. You can't reuse a vault name.
123
120
- You need to reconfigure your access policies and network configuration settings in the new key vault.
124
121
- You need to reconfigure soft-delete and purge protection in the new key vault.
125
-
- The backup and restore operation won't preserve your autorotation settings. You might need to reconfigure the settings.
122
+
- The backup and restore operation doesn't preserve your autorotation settings. You might need to reconfigure the settings.
126
123
127
124
## Modify the template
128
125
@@ -185,7 +182,7 @@ To deploy the template by using Azure portal:
185
182
}
186
183
```
187
184
188
-
10. In case you have configured a service endpoint in your key vault, in the _networkAcl_ section, under _virtualNetworkRules_, add the rule for the target subnet. Ensure that the _ignoreMissingVnetServiceEndpoint_ flag is set to False, so that the IaC fails to deploy the Key Vault in case the service endpoint isn’t configured in the target region. This will ensure that the prerequisites in the target region are met.
185
+
10. In case you configured a service endpoint in your key vault, in the _networkAcl_ section, under _virtualNetworkRules_, add the rule for the target subnet. Ensure that the _ignoreMissingVnetServiceEndpoint_ flag is set to False, so that the IaC fails to deploy the Key Vault in case the service endpoint isn’t configured in the target region.
189
186
190
187
_parameter.json_
191
188
@@ -267,7 +264,7 @@ To deploy the template by using PowerShell:
267
264
}
268
265
```
269
266
270
-
4. In case you have configured a service endpoint in your key vault, in the _networkAcl_ section, under _virtualNetworkRules_, add the rule for the target subnet. Ensure that the _ignoreMissingVnetServiceEndpoint_ flag is set to False, so that the IaC fails to deploy the Key Vault in case the service endpoint isn’t configured in the target region. This will ensure that the prerequisites in the target region are met.
267
+
4. In case you have configured a service endpoint in your key vault, in the _networkAcl_ section, under _virtualNetworkRules_, add the rule for the target subnet. Ensure that the _ignoreMissingVnetServiceEndpoint_ flag is set to False, so that the IaC fails to deploy the Key Vault in case the service endpoint isn’t configured in the target region.
271
268
272
269
_parameter.json_
273
270
@@ -322,7 +319,7 @@ Deploy the template to create a new key vault in the target region.
322
319
323
320
3. Select **I agree to the terms and conditions stated above**, and then select **Select Purchase**.
324
321
325
-
4. Access Policies and Network configuration settings (private endpoints) need to be re-configured in the new Key Vault. Soft delete and purge protection need to be re-configured in the new key vault as well as the _Autorotation settings_.
322
+
4. Access Policies and Network configuration settings (private endpoints) need to be re-configured in the new Key Vault. Soft delete and purge protection need to be re-configured in the new key vault and the _Autorotation settings_.
326
323
327
324
#### [PowerShell](#tab/azure-powershell)
328
325
@@ -344,7 +341,7 @@ Deploy the template to create a new key vault in the target region.
344
341
345
342
---
346
343
347
-
3. Access Policies and Network configuration settings (private endpoints) need to be re-configured in the new Key Vault. Soft delete and purge protection need to be re-configured in the new key vault as well as the _Autorotation settings_.
344
+
3. Access Policies and Network configuration settings (private endpoints) need to be re-configured in the new Key Vault. Soft delete and purge protection need to be re-configured in the new key vault and as the _Autorotation settings_.
348
345
349
346
> [!TIP]
350
347
> If you receive an error which states that the XML specified is not syntactically valid, compare the JSON in your template with the schemas described in the Azure Resource Manager documentation.
0 commit comments