You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -26,6 +26,8 @@ The following diagram demonstrates how customer-managed keys work with Azure Net
26
26
Customer-managed keys don't affect performance of Azure NetApp Files. Its only difference from platform-managed keys is how the key is managed.
27
27
1. For read/write operations, Azure NetApp Files sends requests to Azure Key Vault to unwrap the account encryption key to perform encryption and decryption operations.
28
28
29
+
Cross-tenant customer-managed keys is available in all Azure NetApp Files supported regions.
30
+
29
31
## Considerations
30
32
31
33
* To create a volume using customer-managed keys, you must select the *Standard* network features. You can't use customer-managed key volumes with volume configured using Basic network features. Follow instructions in to [Set the Network Features option](configure-network-features.md#set-the-network-features-option) in the volume creation page.
@@ -38,57 +40,6 @@ The following diagram demonstrates how customer-managed keys work with Azure Net
38
40
* Azure NetApp Files supports customer-managed keys on source and data replication volumes with cross-region replication or cross-zone replication relationships.
39
41
* Applying Azure network security groups (NSG) on the private link subnet to Azure Key Vault is supported for Azure NetApp Files customer-managed keys. NSGs don’t affect connectivity to private links unless a private endpoint network policy is enabled on the subnet.
40
42
41
-
## Supported regions
42
-
43
-
Azure NetApp Files customer-managed keys is supported for the following regions:
44
-
45
-
* Australia Central
46
-
* Australia Central 2
47
-
* Australia East
48
-
* Australia Southeast
49
-
* Brazil South
50
-
* Brazil Southeast
51
-
* Canada Central
52
-
* Canada East
53
-
* Central India
54
-
* Central US
55
-
* East Asia
56
-
* East US
57
-
* East US 2
58
-
* France Central
59
-
* Germany North
60
-
* Germany West Central
61
-
* Israel Central
62
-
* Italy North
63
-
* Japan East
64
-
* Japan West
65
-
* Korea Central
66
-
* Korea South
67
-
* North Central US
68
-
* North Europe
69
-
* Norway East
70
-
* Norway West
71
-
* Qatar Central
72
-
* South Africa North
73
-
* South Central US
74
-
* South India
75
-
* Southeast Asia
76
-
* Spain Central
77
-
* Sweden Central
78
-
* Switzerland North
79
-
* Switzerland West
80
-
* UAE Central
81
-
* UAE North
82
-
* UK South
83
-
* UK West
84
-
* US Gov Arizona
85
-
* US Gov Texas
86
-
* US Gov Virginia
87
-
* West Europe
88
-
* West US
89
-
* West US 2
90
-
* West US 3
91
-
92
43
## Requirements
93
44
94
45
Before creating your first customer-managed key volume, you must set up:
Cross-tenant customer-managed keys (CMK) for Azure NetApp Files volume encryption allows service providers based on Azure to offer [customer-managed key encryption](configure-customer-managed-keys.md). In the cross-tenant scenario, the NetApp account resides in a tenant managed by an independent software vendor, while the key used for encryption of volumes in that NetApp account resides in a key vault in a tenant that you manage.
16
16
17
-
Cross-tenant CMK is supported in all regions where Azure NetApp Files is supported.
17
+
Cross-tenant customer-managed keys is available in all Azure NetApp Files supported regions.
18
18
19
19
## Understand cross-tenant customer-managed keys
20
20
@@ -32,60 +32,8 @@ Following these steps, you install the service provider's application in your te
32
32
33
33
With these three parameters, the service provider provisions Azure resources in tenant 1 that can be encrypted with the customer-managed key in tenant 2.
34
34
35
-
36
-
<!--
37
-
## Supported regions
38
-
39
-
Azure NetApp Files cross-tenant customer-managed keys for volume encryption is supported for the following regions:
40
-
41
-
- Australia Central
42
-
- Australia Central 2
43
-
- Australia East
44
-
- Australia Southeast
45
-
- Brazil South
46
-
- Brazil Southeast
47
-
- Canada Central
48
-
- Canada East
49
-
- Central India
50
-
- Central US
51
-
- East Asia
52
-
- East US
53
-
- East US 2
54
-
- France Central
55
-
- Germany North
56
-
- Germany West Central
57
-
- Israel Central
58
-
- Italy North
59
-
- Japan East
60
-
- Japan West
61
-
- Korea Central
62
-
- Korea South
63
-
- North Central US
64
-
- North Europe
65
-
- Norway East
66
-
- Norway West
67
-
- Qatar Central
68
-
- South Africa North
69
-
- South Central US
70
-
- South India
71
-
- Southeast Asia
72
-
- Spain Central
73
-
- Sweden Central
74
-
- Switzerland North
75
-
- Switzerland West
76
-
- UAE Central
77
-
- UAE North
78
-
- UK South
79
-
- UK West
80
-
- West Europe
81
-
- West US
82
-
- West US 2
83
-
- West US 3
84
-
-->
85
-
86
35
## Register the feature
87
36
88
-
89
37
This feature is currently in preview. You need to register the feature before using it for the first time. After registration, the feature is enabled and works in the background. No UI control is required.
90
38
91
39
1. Register the feature:
@@ -106,9 +54,9 @@ You can also use [Azure CLI commands](/cli/azure/feature) `az feature register`
106
54
107
55
## Configure cross-tenant customer-managed keys for Azure NetApp Files
108
56
109
-
Cross-tenant CMK is currently only supported for the REST API.
57
+
The configuration process for cross-tenant customer-managed keys has portions that can only be completed using the REST API and Azure CLI.
110
58
111
-
## Configure a NetApp account to use a key from a vault in another tenant.
59
+
## Configure a NetApp account to use a key from a vault in another tenant
112
60
113
61
1. Create the application registration.
114
62
1. Navigate to Microsoft Entra ID in the Azure portal
@@ -133,7 +81,7 @@ Cross-tenant CMK is currently only supported for the REST API.
133
81
1. Choose **Select a managed identity**. From the pane, select the subscription. Under **Managed identity**, select **User-assigned managed identity**. In the Select box, search for the managed identity you created earlier, then choose **Select** at the bottom of the pane.
134
82
1. Under Credential details, provide a name and optional description for the credential. Select **Add**.
135
83
1. Create a private endpoint to your key vault:
136
-
1. Have the customer share the full Azure ResourceId of their Key Vault. <!-- huh? -->
84
+
1. Share the full Azure ResourceId of their Key Vault. <!-- huh? -->
137
85
1. Navigate to **Private Endpoints**.
138
86
1. Select **+ Create**.
139
87
1. Choose your subscription and resource group, and enter a name for the Private Endpoint, then select **Next > Resource**.
@@ -147,9 +95,9 @@ Cross-tenant CMK is currently only supported for the REST API.
147
95
### Authorize access to the key vault
148
96
149
97
1. Install the service provider application in the customer tenant
150
-
1. Get the Admin Consent URL from the provider for their cross-tenant application. In our example the URL would look like: `https://login.microsoftonline.com/<tenant1tenantId>/adminconsent/client_id=<client/application ID for the cross tenant-application>`. This opens a login page where you enter your credentials. Once you enter your credentials, you may see an error stating there's no redirect URL configured. This is OK.
98
+
1. Get the Admin Consent URL from the provider for their cross-tenant application. In our example the URL would look like: `https://login.microsoftonline.com/<tenant1-tenantId>/adminconsent/client_id=<client/application ID for the cross tenant-application>`. This opens a login page where you enter your credentials. Once you enter your credentials, you may see an error stating there's no redirect URL configured; this is OK.
151
99
1. Grant the service provider application access to the key vault.
152
-
1. Navigate to your key vault. Select Access Control (IAM) from the left pane.
100
+
1. Navigate to your key vault. Select **Access Control (IAM)** from the left pane.
153
101
1. Under Grant access to this resource, select **Add role assignment**.
154
102
1. Search for then select **Key Vault Crypto User**.
155
103
1. Under Members, select **User, group, or service principal**.
@@ -162,10 +110,13 @@ Cross-tenant CMK is currently only supported for the REST API.
162
110
163
111
### Configure the NetApp account to use your keys
164
112
165
-
1. You must use the `az rest` command to configure your NetApp account to use CMK in a different tenant. Issue the following command:
113
+
>[!NOTE]
114
+
>Using the `az rest` command is the only supported way to to configure your NetApp account to use CMK in a different tenant.
115
+
116
+
1. With the `az rest` command, configure the NetApp account to use CMK in a different tenant:
166
117
167
118
```azurecli
168
-
az rest --method put --uri "/subscriptions/<subscription Id>/resourceGroups/<resource group name>/providers/Microsoft.NetApp/netAppAccounts/<NetApp Account name>?api-version=2024-01-01-preview" --body
119
+
az rest --method put --uri "/subscriptions/<subscription Id>/resourceGroups/<resourceGroupName>/providers/Microsoft.NetApp/netAppAccounts/<NetAppAccountName>?api-version=2024-01-01-preview" --body
Copy file name to clipboardExpand all lines: articles/azure-netapp-files/whats-new.md
+4-6Lines changed: 4 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,22 +6,20 @@ author: b-hchen
6
6
ms.service: azure-netapp-files
7
7
ms.custom: linux-related-content
8
8
ms.topic: overview
9
-
ms.date: 04/16/2025
9
+
ms.date: 04/23/2025
10
10
ms.author: anfdocs
11
11
---
12
12
13
13
# What's new in Azure NetApp Files
14
14
15
15
Azure NetApp Files is updated regularly. This article provides a summary about the latest new features and enhancements.
16
16
17
-
*[Cross-tenant customer-managed keys for Azure NetApp Files volume encryption](customer-managed-keys-cross-tenant.md) (preview)
18
-
17
+
## April 2025
19
18
20
-
Cross-tenant customer-managed keys enables you to manage you own keys across different tenancies. In scenarios such as ISP/user configurations, it ensures that the end user retains full control of their keys, rather than the ISP. This capability grants SaaS providers with flexibility to offer customizable key management options.
19
+
*[Cross-tenant customer-managed keys for Azure NetApp Files volume encryption](customer-managed-keys-cross-tenant.md) (preview)
21
20
22
-
<!-- It is available in all CMK regions. This feature is currently in preview. -->
23
21
24
-
## April 2025
22
+
Cross-tenant customer-managed keys for Azure NetApp Files volume encryption enables you to manage your own keys across different tenancies. In scenarios such as SaaS provider/user configurations, this feature ensures the end user retains full control of their keys rather than the SaaS provider. This capability provides SaaS providers with the flexibility to offer customers customizable key management options. This feature is available in all Azure NetApp Files supported regions. This feature is currently in preview.
0 commit comments