Skip to content

Commit b688589

Browse files
authored
Merge pull request #114876 from itechedit/keyvault-moveregion
edit pass: keyvault-moveregion
2 parents 95e295a + ef40acf commit b688589

File tree

1 file changed

+18
-23
lines changed

1 file changed

+18
-23
lines changed
Lines changed: 18 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Azure Key Vault moving a vault to a different region | Microsoft Docs
3-
description: Guidance on moving a key vault to a different region.
2+
title: Move a key vault to a different region - Azure Key Vault | Microsoft Docs
3+
description: This article offers guidance on moving a key vault to a different region.
44
services: key-vault
55
author: ShaneBala-keyvault
66
manager: ravijan
@@ -14,36 +14,31 @@ ms.author: sudbalas
1414
Customer intent: As a key vault administrator, I want to move my vault to another region.
1515
---
1616

17-
# Moving an Azure Key Vault across regions
17+
# Move an Azure key vault across regions
1818

19-
## Overview
19+
Azure Key Vault doesn't support a resource move operation that permits moving a key vault from one region to another. This article covers workarounds for organizations that have a business need to move a key vault to another region. Each workaround option has limitations. It's critical to understand the implications of these workarounds before you attempt to apply them in a production environment.
2020

21-
Key Vault does not support a resource move operation that permits moving a key vault to another region. This article will cover workarounds if you have a business need to move a key vault to another region. Each option has limitations and it is critical to understand the implications of these workarounds before attempting them in a production environment.
21+
To move a key vault to another region, you create a key vault in that other region and then manually copy each individual secret from your existing key vault to the new key vault. You can do this by using either of the following two options.
2222

23-
If you need to move a key vault to another region, the solution is to create a new key vault in the desired region and manually copy over each individual secret from your existing key vault to the new key vault. This operation can be done in either of the following ways listed below.
23+
## Design considerations
2424

25-
## Design Considerations
25+
Before you begin, keep in mind the following concepts:
2626

27-
* Key Vault names are globally unique. You will not be able to reuse the same vault name.
27+
* Key vault names are globally unique. You can't reuse a vault name.
28+
* You need to reconfigure your access policies and network configuration settings in the new key vault.
29+
* You need to reconfigure soft-delete and purge protection in the new key vault.
30+
* The backup and restore operation won't preserve your autorotation settings. You might need to reconfigure the settings.
2831

29-
* You will need to reconfigure access policies and network configuration settings in the new key vault.
32+
## Option 1: Use the key vault backup and restore commands
3033

31-
* You will need to reconfigure soft-delete and purge protection in the new key vault.
34+
You can back up each individual secret, key, and certificate in your vault by using the backup command. Your secrets are downloaded as an encrypted blob. You can then restore the blob into your new key vault. For a list of commands, see [Azure Key Vault commands](https://docs.microsoft.com/powershell/module/azurerm.keyvault/?view=azurermps-6.13.0#key_vault).
3235

33-
* The back up and restore operation will not preserve autorotation settings you may need to reconfigure these settings.
36+
Using the backup and restore commands has two limitations:
3437

35-
## Option 1 - Use the key vault backup and restore commands
38+
* You can't back up a key vault in one geography and restore it into another geography. For more information, see [Azure geographies](https://azure.microsoft.com/global-infrastructure/geographies/).
3639

37-
You can back up each individual secret, key, and certificate in your vault using the backup command. Your secrets will be downloaded as an encrypted blob. You can then restore the blob into your new key vault. The commands are documented in the link below.
40+
* The backup command backs up all versions of each secret. If you have a secret with a large number of previous versions (more than 10), the request size might exceed the allowed maximum and the operation might fail.
3841

39-
[Azure Key Vault Commands](https://docs.microsoft.com/powershell/module/azurerm.keyvault/?view=azurermps-6.13.0#key_vault)
42+
## Option 2: Manually download and upload the key vault secrets
4043

41-
### Limitations
42-
43-
* You cannot back up a key vault in one geography and restore it into another geography. Learn more about Azure geographies. [Link](https://azure.microsoft.com/global-infrastructure/geographies/)
44-
45-
* The backup command backs up all versions of each secret. If you have a secret with a large number of previous versions (greater than 10) there is a chance the request will exceed the maximum allowed request size and the operation may fail.
46-
47-
## Option 2 - Manually download and upload secrets
48-
49-
Certain secret types can be manually downloaded. For example, you can download certificates as a .pfx file. This option eliminates the geographical restrictions for some secret types such as certificates. You can upload the .pfx files to any key vault in any region. Your secret will be downloaded in a non-password protected format. You will be responsible for securing your secrets once they leave Key Vault while the move is performed.
44+
You can download certain secret types manually. For example, you can download certificates as a PFX file. This option eliminates the geographical restrictions for some secret types, such as certificates. You can upload the PFX files to any key vault in any region. The secrets are downloaded in a non-password protected format. You are responsible for securing your secrets during the move.

0 commit comments

Comments
 (0)