Skip to content

Commit fc2c569

Browse files
committed
Updating based on Lisa's feedback
1 parent 1825850 commit fc2c569

File tree

1 file changed

+14
-14
lines changed

1 file changed

+14
-14
lines changed

articles/azure-app-configuration/concept-customer-managed-keys.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -51,26 +51,24 @@ To begin, you will need a properly configured Azure App Configuration instance.
5151
az keyvault create --name contoso-vault --resource-group contoso-resource-group
5252
```
5353
54-
1. Enable soft-delete and purge-protection for the Key Vault.
55-
Substitute the names of the Key Vault (`contoso-vault`) and Resource Group (`contoso-resource-group`) created in step 1.
54+
1. Enable soft-delete and purge-protection for the Key Vault. Substitute the names of the Key Vault (`contoso-vault`) and Resource Group (`contoso-resource-group`) created in step 1.
5655
5756
```azurecli
5857
az keyvault update --name contoso-vault --resource-group contoso-resource-group --enable-purge-protection --enable-soft-delete
5958
```
6059
61-
1. Create an Key Vault key
62-
Provide a unique `key-name` for this key, and substitute the names of the Key Vault (`contoso-vault`) created in step 1. Specify whether you prefer `RSA` or `RSA-HSM` encryption.
60+
1. Create a Key Vault key. Provide a unique `key-name` for this key, and substitute the names of the Key Vault (`contoso-vault`) created in step 1. Specify whether you prefer `RSA` or `RSA-HSM` encryption.
6361
6462
```azurecli
6563
az keyvault key create --name key-name --kty {RSA or RSA-HSM} --vault-name contoso-vault
6664
```
6765
6866
The output from this command shows the key ID ("kid") for the generated key. Make a note of the key ID to use later in this exercise. The key ID has the form: `https://{my key vault}.vault.azure.net/keys/{key-name}/{Key version}`. The key ID has three important components:
69-
a. Key Vault URI: `https://{my key vault}.vault.azure.net
70-
b. Key Vault key name: {Key Name}
71-
c. Key Vault key version: {Key version}
72-
1. Assign a Managed Identity
73-
Assign a managed identity to an Azure App Configuration instance in order to access the managed key. Create a system assigned managed identity using the Azure CLI, substituting the name of your App Configuration instance and resource group used in the previous steps. We use `contoso-app-config` to illustrate the name of an App Configuration instance:
67+
1. Key Vault URI: `https://{my key vault}.vault.azure.net
68+
1. Key Vault key name: {Key Name}
69+
1. Key Vault key version: {Key version}
70+
71+
1. Create a system assigned managed identity using the Azure CLI, substituting the name of your App Configuration instance and resource group used in the previous steps. The managed identity will be used to access the managed key. We use `contoso-app-config` to illustrate the name of an App Configuration instance:
7472
7573
```azurecli
7674
az appconfig identity assign --na1. me contoso-app-config --group contoso-resource-group --identities [system]
@@ -86,17 +84,19 @@ To begin, you will need a properly configured Azure App Configuration instance.
8684
"userAssignedIdentities": null
8785
}
8886
```
89-
90-
1. Grant Key Vault access to App Configuration
91-
The managed identity of the Azure App Configuration instance needs access to the key to perform key validation, encryption and decryption. The specific set of actions to which it needs access includes: `GET`, `WRAP`, and `UNWRAP` for keys. Granting the access requires the principal ID of the App Configuration instance's managed identity. This value was obtained in the previous step. It is shown below as `contoso-principalId` Grant permission to the managed key using the command line:
87+
88+
1. The managed identity of the Azure App Configuration instance needs access to the key to perform key validation, encryption and decryption. The specific set of actions to which it needs access includes: `GET`, `WRAP`, and `UNWRAP` for keys. Granting the access requires the principal ID of the App Configuration instance's managed identity. This value was obtained in the previous step. It is shown below as `contoso-principalId` Grant permission to the managed key using the command line:
89+
9290
```azurecli
9391
az keyvault set-policy -n contoso-vault --object-id contoso-principalId --key-permissions get wrapKey unwrapKey
9492
```
95-
2. Enable customer-managed key
96-
Once the Azure App Configuration instance can access the managed key, we can enable the customer-managed key capability in the service using the Azure CLI. Recall the following properties recorded during the key creation steps: `key name` `key vault URI`.
93+
94+
1. Once the Azure App Configuration instance can access the managed key, we can enable the customer-managed key capability in the service using the Azure CLI. Recall the following properties recorded during the key creation steps: `key name` `key vault URI`.
95+
9796
```azurecli
9897
az appconfig update -g contoso-resource-group -n contoso-app-config --encryption-key-name key-name --encryption-key-version key-version --encryption-key-vault key-vault-Uri
9998
```
99+
100100
Your Azure App Configuration instance is now configured to use a customer-managed key stored in Azure Key Vault.
101101
102102
## Next Steps

0 commit comments

Comments
 (0)