You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/confidential-computing/quick-create-confidential-vm-arm.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -173,7 +173,7 @@ Use this example to create a custom parameter file for a Linux-based confidentia
173
173
New-MgServicePrincipal -AppId bf7b6499-ff71-4aa2-97a4-f372087be7f0 -DisplayName "Confidential VM Orchestrator"
174
174
```
175
175
176
-
1. Set up your Azure key vault. For how to use an Azure Key Vault Managed HSM instead, see the next step.
176
+
1. Set up your Azure Key Vault. For how to use an Azure Key Vault Managed HSM instead, see the next step.
177
177
178
178
1. Create a resource group for your key vault. Your key vault instance and your confidential VM must be in the same Azure region.
179
179
@@ -198,7 +198,7 @@ Use this example to create a custom parameter file for a Linux-based confidentia
198
198
az keyvault set-policy --name $KeyVault --object-id $cvmAgent.Id --key-permissions get release
199
199
```
200
200
201
-
1. (Optional) If you don't want to use an Azure key vault, you can create an Azure Key Vault Managed HSM instead.
201
+
1. (Optional) If you don't want to use an Azure Key Vault, you can create an Azure Key Vault Managed HSM instead.
202
202
203
203
1. Follow the [quickstart to create an Azure Key Vault Managed HSM](/azure/key-vault/managed-hsm/quick-create-cli) to provision and activate Azure Key Vault Managed HSM.
204
204
1. Enable purge protection on the Azure Managed HSM. This step is required to enable key release.
0 commit comments