You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-maps/how-to-search-for-address.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -215,7 +215,7 @@ The example in this section uses [Get Geocoding] to convert an address into lati
215
215
1. Select the **GET** HTTP method in the **URL** drop-down list, then enter the following URL:
216
216
217
217
```http
218
-
GET https://atlas.microsoft.com/geocode?api-version=2025-01-01&subscription-key={Your-Azure-Maps-Subscription-key}&query=400 Broad St, Seattle, WA 98109
218
+
GET https://atlas.microsoft.com/geocode?api-version=2026-01-01&subscription-key={Your-Azure-Maps-Subscription-key}&query=400 Broad St, Seattle, WA 98109
219
219
```
220
220
221
221
1. Select the **Create** button.
@@ -248,7 +248,7 @@ This example demonstrates how to use the Get Geocode Autocomplete API to search
248
248
1. Select the **GET** HTTP method in the **URL** drop-down list, then enter the following URL:
249
249
250
250
```http
251
-
https://atlas.microsoft.com/geocode:autocomplete?api-version=2025-06-01-preview&query=university of w&bbox=-168,-52,5,84&subscription-key={Your-Azure-Maps-Subscription-key}
251
+
https://atlas.microsoft.com/geocode:autocomplete?api-version=2026-01-01&query=university of w&bbox=-168,-52,5,84&subscription-key={Your-Azure-Maps-Subscription-key}
252
252
```
253
253
254
254
1. Select the run button, then review the response body.
@@ -271,7 +271,7 @@ Next, narrow down the area included in your search to the United States, using t
271
271
1. Select the **GET** HTTP method in the **URL** drop-down list, then enter the following URL:
272
272
273
273
```http
274
-
https://atlas.microsoft.com/geocode:autocomplete?api-version=2025-06-01-preview&query=university of w&bbox=-168,-52,5,84&countryRegion=us&subscription-key={Your-Azure-Maps-Subscription-key}
274
+
https://atlas.microsoft.com/geocode:autocomplete?api-version=2026-01-01&query=university of w&bbox=-168,-52,5,84&countryRegion=us&subscription-key={Your-Azure-Maps-Subscription-key}
275
275
```
276
276
277
277
1. Select the run button, then review the response body.
@@ -294,7 +294,7 @@ Next, focus your search to include more results in a specific area within the de
294
294
1. Select the **GET** HTTP method in the **URL** drop-down list, then enter the following URL:
295
295
296
296
```http
297
-
https://atlas.microsoft.com/geocode:autocomplete?api-version=2025-06-01-preview&query=university of w&bbox=-168,-52,5,84&countryRegion=us&coordinates=-122.136791,47.642232&subscription-key={Your-Azure-Maps-Subscription-key}
297
+
https://atlas.microsoft.com/geocode:autocomplete?api-version=2026-01-01&query=university of w&bbox=-168,-52,5,84&countryRegion=us&coordinates=-122.136791,47.642232&subscription-key={Your-Azure-Maps-Subscription-key}
298
298
```
299
299
300
300
1. Select the run button, then review the response body.
@@ -322,7 +322,7 @@ The examples in this section demonstrate the difference between searching for a
322
322
1. Select the **GET** HTTP method in the **URL** drop-down list, then enter the following URL:
1. Select the run button, then review the response body.
@@ -341,7 +341,7 @@ The examples in this section demonstrate the difference between searching for a
341
341
1. When no values are provided for the `resultTypeGroups` parameter, queries can return both place and address values. If your only interested in searching for addresses, include `resultTypeGroups=address` in your request:
1. Select the run button, and review the response body. You should see one query result. The response includes key address information about T-Mobile Park.
378
378
379
379
1. Next, add the following parameter to the request: `resultTypes=Postcode1`
1. Select the run button, and compare the results to the results returned previously. Because the requested result type is now `Postcode1`, the response doesn't include street address information, just the zip code.
@@ -395,7 +395,7 @@ This example demonstrates how to search for a cross street based on the coordina
395
395
1. Select the **GET** HTTP method in the **URL** drop-down list, then enter the following URL:
# Customer intent: As an IT administrator managing Azure resources across multiple tenants, I want to configure cross-tenant customer-managed keys for volume encryption in Azure NetApp Files, so that I can enhance security and control over encryption keys used for sensitive data.
12
12
---
@@ -91,10 +91,22 @@ The configuration process for cross-tenant customer-managed keys has portions th
91
91
92
92
### Configure the NetApp account to use your keys
93
93
94
-
>[!NOTE]
95
-
>Using the `az rest` command is the only supported way to configure your NetApp account to use CMKin a different tenant.
94
+
>[!IMPORTANT]
95
+
>If the NetApp account is configured with same-tenant customer-managed keys, you must switch the account back to Microsoft-managed keys before configuring cross-tenant CMK. To switch, navigate to **Encryption**in the Azure portal and change the encryption key source to **Microsoft-managed key**.
96
96
97
-
<!-- check API version preview -->
97
+
#### [Portal](#tab/portal-configure)
98
+
99
+
1. In the Azure portal, navigate to your NetApp account and select **Encryption**.
100
+
1. Select **Customer-managed key** as the encryption key source.
101
+
1. Under **Key URI**, select **Enter key URI** and provide the URI of the encryption key.
102
+
1. Under **Identity type**, select **User-assigned**.
103
+
1. Select **Select an identity**, then choose the user-assigned managed identity.
104
+
1. Under **Federated client ID**, enter the application (client) ID of the multitenant application.
105
+
1. Select **Save**.
106
+
107
+
Verify that `federatedClientId` is present in the encryption properties.
108
+
109
+
#### [Azure CLI](#tab/cli-configure)
98
110
99
111
1. With the `az rest` command, configure the NetApp account to use CMK in a different tenant:
100
112
@@ -120,17 +132,84 @@ The configuration process for cross-tenant customer-managed keys has portions th
120
132
```
121
133
Once you have sent the `az rest` command, your NetApp Account has been successfully configured with cross-tenant CMK.
122
134
135
+
Verify the configuration by running:
136
+
137
+
```azurecli
138
+
az netappfiles account show --resource-group <resourceGroupName> --name <NetAppAccountName> --query "{encryption: properties.encryption}" -o json
139
+
```
140
+
141
+
The output should include `federatedClientId` in the encryption identity properties.
142
+
143
+
---
144
+
123
145
### Create a volume
124
146
125
-
>[!NOTE]
126
-
>To create a volume using cross-tenant CMK, you must use the Azure CLI.
147
+
#### [Portal](#tab/portal-volume)
148
+
149
+
1. In the Azure portal, select **Volumes** and then select **Add volume**.
150
+
1. Follow the instructions in [Configure network features for an Azure NetApp Files volume](configure-network-features.md):
151
+
* [Set the Network Features option in volume creation page](configure-network-features.md#set-the-network-features-option).
152
+
* The network security group for the volume's delegated subnet must allow incoming traffic from NetApp's storage VM.
153
+
1. For a NetApp account configured with cross-tenant customer-managed keys, perform the following steps:
154
+
* Select **Customer-Managed Key** in the **Encryption Key Source** dropdown menu.
155
+
* Select **Standard** as the **Network features** option.
156
+
* Select a **key vault private endpoint**.
157
+
1. Continue to complete the volume creation process. Refer to:
158
+
* [Create an NFS volume](azure-netapp-files-create-volumes.md)
159
+
* [Create an SMB volume](azure-netapp-files-create-volumes-smb.md)
160
+
* [Create a dual-protocol volume](create-volumes-dual-protocol.md)
161
+
162
+
#### [Azure CLI](#tab/cli-volume)
127
163
128
-
1. Create the volume using the CLI:
164
+
Create the volume using the CLI:
129
165
130
166
```azurecli
131
167
az netappfiles volume create -g <resource group name> --account-name <NetApp account name> --pool-name <pool name> --name <volume name> -l southcentralus --service-level premium --usage-threshold 100 --file-path "<file path>" --vnet <virtual network name> --subnet default --network-features Standard --encryption-key-source Microsoft.KeyVault --kv-private-endpoint-id <full resource ID to the private endpoint to the customer's vault> --debug
This section describes issues encountered when configuring cross-tenant CMK and the information to resolve them.
175
+
176
+
### Verify cross-tenant CMK configuration
177
+
178
+
To confirm whether a NetApp account is correctly configured for cross-tenant CMK, check for the presence of `federatedClientId` in the account's encryption properties.
179
+
180
+
#### [Portal](#tab/portal-CMK)
181
+
182
+
Navigate to your NetApp account, select **Overview**, then select **JSON View**.
183
+
184
+
If cross-tenant CMK is correctly configured, the encryption properties should include `federatedClientId`.
If `federatedClientId` is missing, the account is configured with the same-tenant CMK and not with cross-tenant CMK.
198
+
199
+
---
200
+
201
+
### Missing Key URI or Encryption Key Source option
202
+
203
+
**Symptom:** When creating a volume in the Azure portal, the **Encryption Key Source** dropdown menu doesn't show **Customer-Managed Key**, or fields for **Key URI**, **subscription**, or **identity type** aren't visible.
204
+
205
+
**Resolution:**
206
+
1. Verify if the NetApp account is correctly configured for cross-tenant CMK as described in [Verify cross-tenant CMK configuration](#verify-cross-tenant-cmk-configuration).
207
+
1. If the account does not have `federatedClientId`, switch the account to Microsoft-managed keys:
208
+
1. In the Azure portal, navigate to the **Encryption** page.
209
+
1. Change the encryption key source to **Microsoft-managed key**.
210
+
1. Select **Save**.
211
+
1. Reconfigure the account for cross-tenant CMK by following the steps in [Configure the NetApp account to use your keys](#configure-the-netapp-account-to-use-your-keys).
0 commit comments