Skip to content

Commit df2b2a1

Browse files
committed
dev feedback
1 parent a48581e commit df2b2a1

File tree

2 files changed

+4
-30
lines changed

2 files changed

+4
-30
lines changed

articles/private-5g-core/collect-required-information-for-a-site.md

Lines changed: 3 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -60,40 +60,14 @@ If you have a Remote Authentication Dial-In User Service (RADIUS) authentication
6060
|---------|---------|
6161
|IP address for the RADIUS AAA server. |RADIUS server address |
6262
|IP address for the network access servers (NAS). |RADIUS NAS address |
63-
|Port to use on the RADIUS AAA server. |RADIUS server port |
63+
|Authentication port to use on the RADIUS AAA server. |RADIUS server port |
6464
|The names of one or more data networks that require RADIUS authentication. |RADIUS Auth applies to DNs |
6565
|Whether to use: </br></br>- the default username and password, defined in your Azure Key Vault </br></br>- the International Mobile Subscriber Identity (IMSI) as the username, with the password defined in your Azure Key Vault. |RADIUS authentication username. |
66-
|URL of the certificate used to secure communication between the packet core and AAA server, stored in your Azure Key Vault. |Shared secret |
66+
|URL of the secret used to secure communication between the packet core and AAA server, stored in your Azure Key Vault. |Shared secret |
6767
|URL of the default username secret, stored in your Azure Key Vault. Not required if using IMSI. |Secret URI for the default username |
6868
|URL of the default password secret, stored in your Azure Key Vault. |Secret URI for the default password |
6969

70-
To add the default username and password secrets to Azure Key Vault, see [Quickstart: Set and retrieve a secret from Azure Key Vault using the Azure portal](../key-vault/secrets/quick-create-portal.md).
71-
72-
To add the certificate to Azure Key Vault:
73-
74-
1. Either [create an Azure Key Vault](../key-vault/general/quick-create-portal.md) or choose an existing one to host your certificate. Ensure the key vault is configured with **Azure Virtual Machines for deployment** resource access.
75-
1. Ensure your certificate is stored in your key vault. You can either [generate a Key Vault certificate](../key-vault/certificates/create-certificate.md) or [import an existing certificate to your Key Vault](../key-vault/certificates/tutorial-import-certificate.md?tabs=azure-portal#import-a-certificate-to-your-key-vault). Your certificate must:
76-
77-
- Be signed by a globally known and trusted CA.
78-
- Use a private key of type RSA or EC to ensure it's exportable (see [Exportable or non-exportable key](../key-vault/certificates/about-certificates.md) for more information).
79-
80-
We also recommend setting a DNS name for your certificate.
81-
82-
1. If you want to configure your certificate to renew automatically, see [Tutorial: Configure certificate auto-rotation in Key Vault](../key-vault/certificates/tutorial-rotate-certificates.md) for information on enabling auto-rotation.
83-
84-
> [!NOTE]
85-
>
86-
> - Certificate validation will always be performed against the latest version of the local access certificate in the Key Vault.
87-
> - If you enable auto-rotation, it might take up to four hours for certificate updates in the Key Vault to synchronize with the edge location.
88-
89-
1. Decide how you want to provide access to your certificate. You can use a Key Vault access policy or Azure role-based access control (RBAC).
90-
91-
- [Assign a Key Vault access policy](../key-vault/general/assign-access-policy.md?tabs=azure-portal). Provide **Get** and **List** permissions under **Secret permissions** and **Certificate permissions** to the **Azure Private MEC** service principal.
92-
- [Provide access to Key Vault keys, certificates, and secrets with an Azure role-based access control (RBAC)](../key-vault/general/rbac-guide.md?tabs=azure-cli). Provide **Key Vault Reader** and **Key Vault Secrets User** permissions to the **Azure Private MEC** service principal.
93-
- If you want to, assign the Key Vault access policy or Azure RBAC to a [user-assigned identity](../active-directory/managed-identities-azure-resources/overview.md).
94-
95-
- If you have an existing user-assigned identity configured for diagnostic collection you can modify it.
96-
- Otherwise, you can create a new user-assigned identity.
70+
To add the secrets to Azure Key Vault, see [Quickstart: Set and retrieve a secret from Azure Key Vault using the Azure portal](../key-vault/secrets/quick-create-portal.md).
9771

9872
## Collect access network values
9973

articles/private-5g-core/security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ As these credentials are highly sensitive, Azure Private 5G Core won't allow use
5252

5353
## RADIUS authentication
5454

55-
Azure Private 5G Core supports Remote Authentication Dial-In User Service (RADIUS) authentication. You can configure the packet core to contact a RADIUS authentication, authorization and accounting (AAA) server in your network to authenticate UEs on attachment to the network and session establishment. Communication between the packet core and RADIUS server is secured with a certificate stored in Azure Key Vault. The default username and password for UEs are also stored in Azure Key Vault. You can use the UE's International Mobile Subscriber Identity (IMSI) in place of a default username. See [Collect RADIUS values](collect-required-information-for-a-site.md#collect-radius-values) for details.
55+
Azure Private 5G Core supports Remote Authentication Dial-In User Service (RADIUS) authentication. You can configure the packet core to contact a RADIUS authentication, authorization and accounting (AAA) server in your network to authenticate UEs on attachment to the network and session establishment. Communication between the packet core and RADIUS server is secured with a shared secret that is stored in Azure Key Vault. The default username and password for UEs are also stored in Azure Key Vault. You can use the UE's International Mobile Subscriber Identity (IMSI) in place of a default username. See [Collect RADIUS values](collect-required-information-for-a-site.md#collect-radius-values) for details.
5656

5757
Your RADIUS server must be reachable from your Azure Stack Edge device on the management network. RADIUS is only supported for initial authentication. Other RADIUS features, such as accounting, are not supported.
5858

0 commit comments

Comments
 (0)