You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| If the diagnostic setting creation fails for your key vault, you'll see this error. <!--<br> -->| This is not a blocking error and the activation key will be generated. <br>You can manually [Create a diagnostic setting to store your audit logs](../key-vault/general/howto-logging.md#create-a-storage-account-for-your-logs). |
52
-
| If the storage account creation fails, for example, because an account already exists for the name you specified, you'll see this error. <!--<br> -->| You can manually create a storage account and link it to the diagnostic setting on your key vault. This account is then used to store audit logs. <br> For more information, see [Create a storage account for your logs](../key-vault/general/howto-logging.md#create-a-storage-account-for-your-logs). |
51
+
| If the diagnostic setting creation fails for your key vault, you'll see this error. <!--<br> -->| This is not a blocking error and the activation key will be generated. <br>You can manually [Create a diagnostic setting to store your audit logs](../key-vault/general/howto-logging.md). |
52
+
| If the storage account creation fails, for example, because an account already exists for the name you specified, you'll see this error. <!--<br> -->| You can manually create a storage account and link it to the diagnostic setting on your key vault. This account is then used to store audit logs. <br> For more information, see [Create a storage account for your logs](../key-vault/general/howto-logging.md). |
53
53
|If the system assigned managed identity for your Azure Stack Edge resource is deleted, you'll see this error. <!--<br> -->| You'll see an alert in the Security blade for your Azure Stack Edge resource. Select this alert to [Create a new managed identity through the Recover key vault blade](azure-stack-edge-gpu-activation-key-vault.md#recover-key-vault)|
54
54
| If the managed identity doesn't have access to the key vault, you'll see this error. <!--<br> -->| You'll see an alert in the Security blade for your Azure Stack Edge resource. Select this alert to [Grant managed identity access to the key vault through the Recover key vault blade](azure-stack-edge-gpu-activation-key-vault.md#recover-key-vault). |
55
55
@@ -59,7 +59,7 @@ The following table summarizes the errors related to device activation and the c
| If the key vault resource is moved across resource groups or subscriptions, you'll see this error. <!--<br> -->| The key vault resource move is treated the same way as key vault deletion. You can restore the key vault if the vault is in purge-protection duration. If the purge-protection duration has elapsed, then you'll need to create a new key vault. For more information on either of the above cases, see [Recover a key vault](azure-stack-edge-gpu-activation-key-vault.md#recover-key-vault). |
61
61
| If the subscription you are using, is moved across tenants, you'll see this error. <!--<br> -->| Reconfigure managed identity and create a new key vault. You can also move the key vault resource in which case only the managed identity will need to be reconfigured. In each of the above cases, see [Recover a key vault](azure-stack-edge-gpu-activation-key-vault.md#recover-key-vault). |
62
-
| If the storage account resource that is used for audit logs, is moved across resource groups or subscriptions, you won't see an error. | You can [Create a new storage account and configure it to store the audit logs](../key-vault/general/howto-logging.md#create-a-storage-account-for-your-logs). |
62
+
| If the storage account resource that is used for audit logs, is moved across resource groups or subscriptions, you won't see an error. | You can [Create a new storage account and configure it to store the audit logs](../key-vault/general/howto-logging.md). |
Copy file name to clipboardExpand all lines: articles/key-vault/certificates/about-certificates.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -110,10 +110,10 @@ The following table represents the mapping of x509 key usage policy to effective
110
110
|----------|--------|--------|
111
111
|DataEncipherment|encrypt, decrypt| N/A |
112
112
|DecipherOnly|decrypt| N/A |
113
-
|DigitalSignature|sign, verify| Key Vault default without a usage specification at certificate creation time |
113
+
|DigitalSignature|sign, verify| Key Vault default without a usage specification at certificate creation time |
114
114
|EncipherOnly|encrypt| N/A |
115
115
|KeyCertSign|sign, verify|N/A|
116
-
|KeyEncipherment|wrapKey, unwrapKey| Key Vault default without a usage specification at certificate creation time |
116
+
|KeyEncipherment|wrapKey, unwrapKey| Key Vault default without a usage specification at certificate creation time |
117
117
|NonRepudiation|sign, verify| N/A |
118
118
|crlsign|sign, verify| N/A |
119
119
@@ -134,7 +134,7 @@ Before a certificate issuer can be created in a Key Vault, following prerequisit
134
134
135
135
- An organization administrator must on-board their company (ex. Contoso) with at least one CA provider.
136
136
137
-
2. Admin creates requester credentials for Key Vault to enroll (and renew) TLS/SSL certificates
137
+
1. Admin creates requester credentials for Key Vault to enroll (and renew) TLS/SSL certificates
138
138
139
139
- Provides the configuration to be used to create an issuer object of the provider in the key vault
140
140
@@ -155,7 +155,6 @@ Certificate contacts contain contact information to send notifications triggered
155
155
156
156
Access control for certificates is managed by Key Vault, and is provided by the Key Vault that contains those certificates. The access control policy for certificates is distinct from the access control policies for keys and secrets in the same Key Vault. Users may create one or more vaults to hold certificates, to maintain scenario appropriate segmentation and management of certificates. For more information on certificate access control, see [here](certificate-access-control.md)
157
157
158
-
159
158
## Certificate Use Cases
160
159
161
160
### Secure communication and authentication
@@ -166,6 +165,7 @@ TLS certificates can help encrypt communications over the internet and establish
166
165
* Cloud/Multi-Cloud: secure cloud-based applications on-prem, cross-cloud, or in your cloud provider's tenant.
167
166
168
167
### Code signing
168
+
169
169
A certificate can help secure the code/script of software, thereby ensuring that the author can share the software over the internet without being changed by malicious entities. Furthermore, once the author signs the code using a certificate leveraging the code signing technology, the software is marked with a stamp of authentication displaying the author and their website. Therefore, the certificate used in code signing helps validate the software's authenticity, promoting end-to-end security.
* Sufficient storage on Azure for your Key Vault logs.
38
+
You will also need a destination for your logs. This can be an existing or new Azure storage account and/or Log Analytics workspace.
38
39
39
-
In this article, commands are formatted for [Cloud Shell](https://shell.azure.com) with Bash as an environment.
40
+
> [!IMPORTANT]
41
+
> If you use an existing Azure storage account or Log Analytics workspace, it must be in the same subscription as your key vault. It must also use the Azure Resource Manager deployment model, rather than the classic deployment model.
42
+
>
43
+
> If you create a new Azure storage account or Log Analytics workspace, we recommend you create it in the same resource group as your key vault, for ease of management.
44
+
45
+
You can create a new Azure storage account using one of these methods:
46
+
-[Create a storage account using the Azure CLI](../../storage/common/storage-account-create.md?tabs=azure-cli)
47
+
-[Create a storage account using Azure PowerShell](../../storage/common/storage-account-create.md?tabs=azure-powershell)
48
+
-[Create a storage account using the Azure portal](../../storage/common/storage-account-create.md?tabs=azure-portal)
49
+
50
+
You can create a new Log Analytics workspace using one of these methods:
51
+
-[Create a Log Analytics workspace using the Azure CLI](../../azure-monitor/logs/quick-create-workspace.md?tabs=azure-cli)
52
+
-[Create a Log Analytics workspace using Azure PowerShell](../../azure-monitor/logs/quick-create-workspace.md?tabs=azure-powershell)
53
+
-[Create a Log Analytics workspace the Azure portal](../../azure-monitor/logs/quick-create-workspace.md?tabs=azure-portal)
40
54
41
55
## Connect to your Key Vault subscription
42
56
@@ -58,41 +72,11 @@ Get-AzSubscription
58
72
Set-AzContext -SubscriptionId "<subscriptionID>"
59
73
```
60
74
61
-
## Create a storage account for your logs
62
-
63
-
Although you can use an existing storage account for your logs, here you create a new storage account dedicated to Key Vault logs.
64
-
65
-
For additional ease of management, you'll also use the same resource group as the one that contains the key vault. In the [Azure CLI quickstart](quick-create-cli.md) and [Azure PowerShell quickstart](quick-create-powershell.md), this resource group is named **myResourceGroup**, and the location is *eastus*. Replace these values with your own, as applicable.
66
-
67
-
You also need to provide a storage account name. Storage account names must be unique, between 3 and 24 characters in length, and use numbers and lowercase letters only. Lastly, you create a storage account of the `Standard_LRS` SKU.
68
-
69
-
With the Azure CLI, use the [az storage account create](/cli/azure/storage/account#az-storage-account-create) command.
70
-
71
-
```azurecli-interactive
72
-
az storage account create --name "<your-unique-storage-account-name>" -g "myResourceGroup" --sku "Standard_LRS"
73
-
```
74
-
75
-
With Azure PowerShell, use the [New-AzStorageAccount](/powershell/module/az.storage/new-azstorageaccount) cmdlet. You will need to provide the location that corresponds to the resource group.
In either case, note the ID of the storage account. The Azure CLI operation returns the ID in the output. To obtain the ID with Azure PowerShell, use [Get-AzStorageAccount](/powershell/module/az.storage/get-azstorageaccount), and assign the output to the variable `$sa`. You can then see the storage account with `$sa.id`. (The `$sa.Context` property is also used later in this article.)
The ID of the storage account is in the following format: "/subscriptions/*your-subscription-ID*/resourceGroups/myResourceGroup/providers/Microsoft.Storage/storageAccounts/*your-unique-storage-account-name*".
89
-
90
-
> [!NOTE]
91
-
> If you decide to use an existing storage account, it must use the same subscription as your key vault. It must use the Azure Resource Manager deployment model, rather than the classic deployment model.
77
+
To enable logging on a key vault, you will need the resource ID of the key vault, as well as the destination (Azure Storage or Log Analytics account).
92
78
93
-
## Obtain your key vault resource ID
94
-
95
-
In the [CLI quickstart](quick-create-cli.md) and [PowerShell quickstart](quick-create-powershell.md), you created a key with a unique name. Use that name again in the following steps. If you can't remember the name of your key vault, you can use the Azure CLI [az keyvault list](/cli/azure/keyvault#az-keyvault-list) command, or the Azure PowerShell [Get-AzKeyVault](/powershell/module/az.keyvault/get-azkeyvault) cmdlet, to list them.
79
+
If you can't remember the name of your key vault, you can use the Azure CLI [az keyvault list](/cli/azure/keyvault#az-keyvault-list) command, or the Azure PowerShell [Get-AzKeyVault](/powershell/module/az.keyvault/get-azkeyvault) cmdlet, to find it.
96
80
97
81
Use the name of your key vault to find its resource ID. With the Azure CLI, use the [az keyvault show](/cli/azure/keyvault#az-keyvault-show) command.
To configure diagnostic settings in the Azure portal, follow these steps:
152
136
153
-
1. From the **Resource** pane menu, select **Diagnostic settings**.
137
+
1. From the **Resource** pane menu, select **Diagnostic settings**, and then **Add diagnostic setting**
154
138
155
139
:::image type="content" source="../media/diagnostics-portal-1.png" alt-text="Screenshot that shows how to select diagnostic settings.":::
156
140
157
-
1. Select **+ Add diagnostic setting**.
158
-
159
-
:::image type="content" source="../media/diagnostics-portal-2.png" alt-text="Screenshot that shows adding a diagnostic setting.":::
160
-
161
-
1. Select a name for your diagnostic setting. To configure logging for Azure Monitor for Key Vault, select **AuditEvent** and **Send to Log Analytics workspace**. Then choose the subscription and Log Analytics workspace to which you want to send your logs. You can also select the option to **Archive to a storage account**.
141
+
1. Under **Category groups**, select both **audit** and **allLogs**.
142
+
1. If Azure Log Analytics is the destination, select **Send to Log Analytics workspace** and choose your subscription and workspace from the drop-down menus. You may also select **Archive to a storage account** and choose your subscription and storage account from the drop-down menus.
162
143
163
-
:::image type="content" source="../media/diagnostics-portal-3.png" alt-text="Screenshot of diagnostic settings options.":::
144
+
:::image type="content" source="../media/diagnostics-portal-2.png" alt-text="Screenshot of diagnostic settings options.":::
164
145
165
-
Otherwise, select the options that pertain to the logs that you want to select.
166
146
167
147
1. When you have selected your desired options, select **Save**.
168
148
169
-
:::image type="content" source="../media/diagnostics-portal-4.png" alt-text="Screenshot that shows how to save the options you selected.":::
149
+
:::image type="content" source="../media/diagnostics-portal-3.png" alt-text="Screenshot that shows how to save the options you selected.":::
0 commit comments