Skip to content

Commit ce60a66

Browse files
authored
Merge pull request #106051 from amitbapat/vabyok-changes
Small edits
2 parents 277e8ca + 1c626d7 commit ce60a66

File tree

1 file changed

+4
-1
lines changed

1 file changed

+4
-1
lines changed

articles/key-vault/hsm-protected-keys-vendor-agnostic-byok.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,6 +87,9 @@ The KEK must be:
8787
- Generated in the same key vault where you intend to import the target key
8888
- Created with allowed key operations set to `import`
8989

90+
> [!NOTE]
91+
> The KEK must have 'import' as the only allowed key operation. 'import' is mutually exclusive with all other key operations.
92+
9093
Use the [az keyvault key create](/cli/azure/keyvault/key?view=azure-cli-latest#az-keyvault-key-create) command to create a KEK that has key operations set to `import`. Record the key identifier (`kid`) that's returned from the following command. (You will use the `kid` value in [Step 3](#step-3-generate-and-prepare-your-key-for-transfer).)
9194

9295
```azurecli
@@ -112,7 +115,7 @@ Transfer the BYOK file to your connected computer.
112115
> [!NOTE]
113116
> Importing RSA 1,024-bit keys is not supported. Currently, importing an Elliptic Curve (EC) key is not supported.
114117
>
115-
> **Known issue**: Importing an RSA 4K target key from SafeNet Luna HSMs fails. When the issue is resolved, this article will be updated.
118+
> **Known issue**: Importing an RSA 4K target key from SafeNet Luna HSMs is only supported with firmware 7.4.0 or newer.
116119
117120
### Step 4: Transfer your key to Azure Key Vault
118121

0 commit comments

Comments
 (0)