Skip to content

Commit ae2e489

Browse files
authored
Merge pull request #274220 from MicrosoftDocs/repo_sync_working_branch
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/azure-docs (branch main)
2 parents c08e6f1 + b86f325 commit ae2e489

File tree

2 files changed

+23
-25
lines changed

2 files changed

+23
-25
lines changed

articles/azure-app-configuration/concept-customer-managed-keys.md

Lines changed: 15 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Azure App Configuration encrypts sensitive information at rest by using a 256-bi
1919
> [!IMPORTANT]
2020
> If the identity assigned to the App Configuration instance is no longer authorized to unwrap the instance's encryption key, or if the managed key is permanently deleted, then it will no longer be possible to decrypt sensitive information stored in the App Configuration instance. By using Azure Key Vault's [soft delete](../key-vault/general/soft-delete-overview.md) function, you mitigate the chance of accidentally deleting your encryption key.
2121
22-
When users enable the customer managed key capability on their Azure App Configuration instance, they control the service’s ability to access their sensitive information. The managed key serves as a root encryption key. Users can revoke their App Configuration instance’s access to their managed key by changing their key vault access policy. When this access is revoked, App Configuration will lose the ability to decrypt user data within one hour. At this point, the App Configuration instance will forbid all access attempts. This situation is recoverable by granting the service access to the managed key once again. Within one hour, App Configuration will be able to decrypt user data and operate under normal conditions.
22+
When users enable the customer-managed key capability on their Azure App Configuration instance, they control the service’s ability to access their sensitive information. The managed key serves as a root encryption key. Users can revoke their App Configuration instance’s access to their managed key by changing their key vault access policy. When this access is revoked, App Configuration will lose the ability to decrypt user data within one hour. At this point, the App Configuration instance will forbid all access attempts. This situation is recoverable by granting the service access to the managed key once again. Within one hour, App Configuration will be able to decrypt user data and operate under normal conditions.
2323

2424
> [!NOTE]
2525
> All Azure App Configuration data is stored for up to 24 hours in an isolated backup. This includes the unwrapped encryption key. This data isn't immediately available to the service or service team. In the event of an emergency restore, Azure App Configuration will revoke itself again from the managed key data.
@@ -40,30 +40,24 @@ After these resources are configured, use the following steps so that the Azure
4040

4141
## Enable customer-managed key encryption for your App Configuration store
4242

43-
1. [Create an App Configuration store](./quickstart-azure-app-configuration-create.md) if you don't have one.
43+
1. [Create an App Configuration store](./quickstart-azure-app-configuration-create.md) in the Standard tier if you don't have one.
4444

45-
1. Create an Azure Key Vault by using the Azure CLI. Both `vault-name` and `resource-group-name` are user-provided and must be unique. We use `contoso-vault` and `contoso-resource-group` in these examples.
45+
1. Using the Azure CLI, create an Azure Key Vault with purge protection enabled. Soft delete is enabled by default. Both `vault-name` and `resource-group-name` are user-provided and must be unique. We use `contoso-vault` and `contoso-resource-group` in these examples.
4646

4747
```azurecli
48-
az keyvault create --name contoso-vault --resource-group contoso-resource-group
48+
az keyvault create --name contoso-vault --resource-group contoso-resource-group --enable-purge-protection
4949
```
5050
51-
1. Enable soft-delete and purge-protection for the Key Vault. Substitute the names of the Key Vault (`contoso-vault`) and Resource Group (`contoso-resource-group`) created in step 1.
52-
53-
```azurecli
54-
az keyvault update --name contoso-vault --resource-group contoso-resource-group --enable-purge-protection --enable-soft-delete
55-
```
56-
57-
1. Create a Key Vault key. Provide a unique `key-name` for this key, and substitute the names of the Key Vault (`contoso-vault`) created in step 1. Specify whether you prefer `RSA` or `RSA-HSM` encryption.
51+
1. Create a Key Vault key. Provide a unique `key-name` for this key, and substitute the name of the Key Vault (`contoso-vault`) created in step 2. Specify whether you prefer `RSA` or `RSA-HSM` encryption (`RSA-HSM` is only available in the Premium tier).
5852
5953
```azurecli
6054
az keyvault key create --name key-name --kty {RSA or RSA-HSM} --vault-name contoso-vault
6155
```
6256
63-
The output from this command shows the key ID ("kid") for the generated key. Make a note of the key ID to use later in this exercise. The key ID has the form: `https://{my key vault}.vault.azure.net/keys/{key-name}/{Key version}`. The key ID has three important components:
64-
1. Key Vault URI: `https://{my key vault}.vault.azure.net
65-
1. Key Vault key name: {Key Name}
66-
1. Key Vault key version: {Key version}
57+
The output from this command shows the key ID (`kid`) for the generated key. Make a note of the key ID to use later in this exercise. The key ID has the form: `https://{my key vault}.vault.azure.net/keys/{key-name}/{key-version}`. The key ID has three important components:
58+
1. Key Vault URI: `https://{my key vault}.vault.azure.net`
59+
1. Key Vault key name: `{key-name}`
60+
1. Key Vault key version: `{key-version}`
6761
6862
1. Create a system-assigned managed identity by using the Azure CLI, substituting the name of your App Configuration instance and resource group used in the previous steps. The managed identity will be used to access the managed key. We use `contoso-app-config` to illustrate the name of an App Configuration instance:
6963
@@ -75,20 +69,20 @@ After these resources are configured, use the following steps so that the Azure
7569
7670
```json
7771
{
78-
"principalId": {Principal Id},
79-
"tenantId": {Tenant Id},
80-
"type": "SystemAssigned",
81-
"userAssignedIdentities": null
72+
"principalId": {Principal Id},
73+
"tenantId": {Tenant Id},
74+
"type": "SystemAssigned",
75+
"userAssignedIdentities": null
8276
}
8377
```
8478
85-
1. The managed identity of the Azure App Configuration instance needs access to the key to perform key validation, encryption, and decryption. The specific set of actions to which it needs access includes: `GET`, `WRAP`, and `UNWRAP` for keys. Granting access requires the principal ID of the App Configuration instance's managed identity. This value was obtained in the previous step. It's shown below as `contoso-principalId`. Grant permission to the managed key by using the command line:
79+
1. The managed identity of the Azure App Configuration instance needs access to the key to perform key validation, encryption, and decryption. The specific set of actions to which it needs access includes: `GET`, `WRAP`, and `UNWRAP` for keys. Granting access requires the principal ID of the App Configuration instance's managed identity. Replace the value shown below as `contoso-principalId` with the principal ID obtained in the previous step. Grant permission to the managed key by using the command line:
8680
8781
```azurecli
8882
az keyvault set-policy -n contoso-vault --object-id contoso-principalId --key-permissions get wrapKey unwrapKey
8983
```
9084
91-
1. After the Azure App Configuration instance can access the managed key, we can enable the customer-managed key capability in the service by using the Azure CLI. Recall the following properties recorded during the key creation steps: `key name` `key vault URI`.
85+
1. Now that the Azure App Configuration instance can access the managed key, we can enable the customer-managed key capability in the service by using the Azure CLI. Recall the following properties recorded during the key creation steps: `key name` `key vault URI`.
9286
9387
```azurecli
9488
az appconfig update -g contoso-resource-group -n contoso-app-config --encryption-key-name key-name --encryption-key-version key-version --encryption-key-vault key-vault-Uri

articles/virtual-machines/shared-image-galleries.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -223,15 +223,15 @@ To list all the Azure Compute Gallery resources across subscriptions that you ha
223223
1. Look for resources of the **Azure Compute Gallery** type.
224224

225225

226-
### [Azure CLI](#tab/azure-cli)
226+
# [Azure CLI](#tab/azure-cli)
227227

228228
To list all the Azure Compute Gallery resources, across subscriptions that you have permissions to, use the following command in the Azure CLI:
229229

230230
```azurecli
231231
az account list -otsv --query "[].id" | xargs -n 1 az sig list --subscription
232232
```
233233

234-
### [Azure PowerShell](#tab/azure-powershell)
234+
# [Azure PowerShell](#tab/azure-powershell)
235235

236236
To list all the Azure Compute Gallery resources, across subscriptions that you have permissions to, use the following command in the Azure PowerShell:
237237

@@ -247,6 +247,8 @@ Get-AzSubscription | ForEach-Object @params
247247

248248
For more information, see [List, update, and delete image resources](update-image-resources.md).
249249

250+
---
251+
250252
### Can I move my existing image to an Azure Compute Gallery?
251253

252254
Yes. There are 3 scenarios based on the types of images you may have.
@@ -302,22 +304,24 @@ There are two ways you can specify the number of image version replicas to be cr
302304
1. The regional replica count which specifies the number of replicas you want to create per region.
303305
2. The common replica count which is the default per region count in case regional replica count isn't specified.
304306

305-
### [Azure CLI]
307+
# [Azure CLI](#tab/azure-cli)
306308

307309
To specify the regional replica count, pass the location along with the number of replicas you want to create in that region: "South Central US=2".
308310

309311
If regional replica count isn't specified with each location, then the default number of replicas will be the common replica count that you specified.
310312

311313
To specify the common replica count in Azure CLI, use the **--replica-count** argument in the `az sig image-version create` command.
312314

313-
### [Azure PowerShell]
315+
# [Azure PowerShell](#tab/azure-powershell)
314316

315317
To specify the regional replica count, pass the location along with the number of replicas you want to create in that region, `@{Name = 'South Central US';ReplicaCount = 2}`, to the **-TargetRegion** parameter in the `New-AzGalleryImageVersion` command.
316318

317319
If regional replica count isn't specified with each location, then the default number of replicas will be the common replica count that you specified.
318320

319321
To specify the common replica count in Azure PowerShell, use the **-ReplicaCount** parameter in the `New-AzGalleryImageVersion` command.
320322

323+
---
324+
321325
### Can I create the gallery in a different location than the one for the image definition and image version?
322326

323327
Yes, it's possible. But, as a best practice, we encourage you to keep the resource group, gallery, image definition, and image version in the same location.

0 commit comments

Comments
 (0)