Skip to content

Commit e745650

Browse files
committed
trying again
1 parent 6de68d7 commit e745650

File tree

1 file changed

+0
-86
lines changed

1 file changed

+0
-86
lines changed

articles/virtual-machines/disks-cross-tenant-customer-managed-keys.md

Lines changed: 0 additions & 86 deletions
Original file line numberDiff line numberDiff line change
@@ -172,93 +172,7 @@ Content-Type: application/json
172172

173173
---
174174

175-
### ARM
176175

177-
```json
178-
{
179-
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
180-
"contentVersion": "1.0.0.0",
181-
"parameters": {
182-
"desname": {
183-
"defaultValue": "<Enter ISV disk encryption set name>",
184-
"type": "String"
185-
},
186-
"region": {
187-
"defaultValue": "WestCentralUS",
188-
"type": "String"
189-
},
190-
"userassignedmicmk": {
191-
"defaultValue": "/subscriptions/<Enter ISV Subscription Id>/resourceGroups/<Enter ISV resource group name>/providers/Microsoft.ManagedIdentity/userAssignedIdentities/<Enter ISV User Assigned Identity Name>",
192-
"type": "String"
193-
},
194-
"cmkfederatedclientId": {
195-
"defaultValue": "<Enter ISV Multi-Tenant App Id>",
196-
"type": "String"
197-
},
198-
"keyVaultURL": {
199-
"defaultValue": "<Enter Client Key URL>",
200-
"type": "String"
201-
},
202-
"encryptionType": {
203-
"defaultValue": "EncryptionAtRestWithCustomerKey",
204-
"type": "String"
205-
}
206-
},
207-
"variables": {},
208-
"resources": [
209-
{
210-
"type": "Microsoft.Compute/diskEncryptionSets",
211-
"apiVersion": "2021-12-01",
212-
"name": "[parameters('desname')]",
213-
"location": "[parameters('region')]",
214-
"identity": {
215-
"type": "UserAssigned",
216-
"userAssignedIdentities": {
217-
"[parameters('userassignedmicmk')]": {}
218-
}
219-
},
220-
"properties": {
221-
"activeKey": {
222-
"keyUrl": "[parameters('keyVaultURL')]"
223-
},
224-
"federatedClientId": "[parameters('cmkfederatedclientId')]",
225-
"encryptionType": "[parameters('encryptionType')]"
226-
}
227-
}
228-
]
229-
}
230-
```
231-
232-
### REST API
233-
234-
Use bearer token as authorization header and application/JSON as content type in BODY. (Network tab, filter to management.azure while performing any ARM request on portal.)
235-
236-
```rest
237-
PUT https://management.azure.com/subscriptions/<Enter ISV Subscription Id>/resourceGroups/<Enter ISV Resource Group Name>/providers/Microsoft.Compute/diskEncryptionSets/<Enter ISV Disk Encryption Set Name>?api-version=2021-12-01
238-
Authorization: Bearer ...
239-
Content-Type: application/json
240-
241-
{
242-
"name": "<Enter ISV disk encryption set name>",
243-
"id": "/subscriptions/<Enter ISV Subscription Id>/resourceGroups/<Enter ISV resource group name>/providers/Microsoft.Compute/diskEncryptionSets/<Enter ISV disk encryption set name>/",
244-
"type": "Microsoft.Compute/diskEncryptionSets",
245-
"location": "westcentralus",
246-
"identity": {
247-
"type": "UserAssigned",
248-
"userAssignedIdentities": {
249-
"/subscriptions/<Enter ISV Subscription Id>/resourceGroups/<Enter ISV resource group name>/providers/Microsoft.ManagedIdentity/userAssignedIdentities/<Enter ISV User Assigned Identity Name>
250-
": {}
251-
}
252-
},
253-
"properties": {
254-
"activeKey": {
255-
"keyUrl": "<Enter Client Key URL>"
256-
},
257-
"encryptionType": "EncryptionAtRestWithCustomerKey",
258-
"federatedClientId": "<Enter ISV Multi-Tenant App Id>"
259-
}
260-
}
261-
```
262176

263177
## Next steps
264178

0 commit comments

Comments
 (0)