Skip to content

Commit f1ef3c1

Browse files
committed
encryption scopes can use key vault in different region
1 parent 941a8f9 commit f1ef3c1

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/storage/blobs/encryption-scope-manage.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: storage
66
author: jimmart-dev
77

88
ms.service: storage
9-
ms.date: 10/27/2022
9+
ms.date: 03/10/2023
1010
ms.topic: conceptual
1111
ms.author: jammart
1212
ms.reviewer: ozgun
@@ -23,7 +23,7 @@ This article shows how to create an encryption scope. It also shows how to speci
2323

2424
## Create an encryption scope
2525

26-
You can create an encryption scope that is protected with a Microsoft-managed key or with a customer-managed key that is stored in an Azure Key Vault or in an Azure Key Vault Managed Hardware Security Model (HSM). To create an encryption scope with a customer-managed key, you must first create a key vault or managed HSM and add the key you intend to use for the scope. The key vault or managed HSM must have purge protection enabled and must be in the same region as the storage account.
26+
You can create an encryption scope that is protected with a Microsoft-managed key or with a customer-managed key that is stored in an Azure Key Vault or in an Azure Key Vault Managed Hardware Security Model (HSM). To create an encryption scope with a customer-managed key, you must first create a key vault or managed HSM and add the key you intend to use for the scope. The key vault or managed HSM must have purge protection enabled. The storage account and key vault can be in different regions.
2727

2828
An encryption scope is automatically enabled when you create it. After you create the encryption scope, you can specify it when you create a blob. You can also specify a default encryption scope when you create a container, which automatically applies to all blobs in the container.
2929

@@ -38,7 +38,7 @@ To create an encryption scope in the Azure portal, follow these steps:
3838
1. In the **Create Encryption Scope** pane, enter a name for the new scope.
3939
1. Select the desired type of encryption key support, either **Microsoft-managed keys** or **Customer-managed keys**.
4040
- If you selected **Microsoft-managed keys**, click **Create** to create the encryption scope.
41-
- If you selected **Customer-managed keys**, then select a subscription and specify a key vault or a managed HSM and a key to use for this encryption scope.
41+
- If you selected **Customer-managed keys**, then select a subscription and specify a key vault and a key to use for this encryption scope. If the desired key vault is in a different region, select **Enter key URI** and specify the key URI.
4242
1. If infrastructure encryption is enabled for the storage account, then it will automatically be enabled for the new encryption scope. Otherwise, you can choose whether to enable infrastructure encryption for the encryption scope.
4343

4444
:::image type="content" source="media/encryption-scope-manage/create-encryption-scope-customer-managed-key-portal.png" alt-text="Screenshot showing how to create encryption scope in Azure portal" lightbox="media/encryption-scope-manage/create-encryption-scope-customer-managed-key-portal.png":::
@@ -70,7 +70,7 @@ New-AzStorageEncryptionScope -ResourceGroupName $rgName `
7070

7171
To create a new encryption scope that is protected by customer-managed keys stored in a key vault or managed HSM, first configure customer-managed keys for the storage account. You must assign a managed identity to the storage account and then use the managed identity to configure the access policy for the key vault or managed HSM so that the storage account has permissions to access it.
7272

73-
To configure customer-managed keys for use with an encryption scope, purge protection must be enabled on the key vault or managed HSM. The key vault or managed HSM must be in the same region as the storage account.
73+
To configure customer-managed keys for use with an encryption scope, purge protection must be enabled on the key vault or managed HSM. The key vault or managed HSM can be in a different region from the storage account.
7474

7575
Remember to replace the placeholder values in the example with your own values:
7676

@@ -131,7 +131,7 @@ az storage account encryption-scope create \
131131

132132
To create a new encryption scope that is protected by customer-managed keys in a key vault or managed HSM, first configure customer-managed keys for the storage account. You must assign a managed identity to the storage account and then use the managed identity to configure the access policy for the key vault so that the storage account has permissions to access it. For more information, see [Customer-managed keys for Azure Storage encryption](../common/customer-managed-keys-overview.md).
133133

134-
To configure customer-managed keys for use with an encryption scope, purge protection must be enabled on the key vault or managed HSM. The key vault or managed HSM must be in the same region as the storage account.
134+
To configure customer-managed keys for use with an encryption scope, purge protection must be enabled on the key vault or managed HSM. The key vault or managed HSM can be in a different region from the storage account.
135135

136136
Remember to replace the placeholder values in the example with your own values:
137137

0 commit comments

Comments
 (0)