Skip to content

Commit e534333

Browse files
authored
Merge pull request #312460 from netapp-manishc/NFSAAS-149992
NFSAAS-149992: Add Portal instructions and troubleshooting for cross-…
2 parents f96c357 + 54f5116 commit e534333

1 file changed

Lines changed: 87 additions & 8 deletions

File tree

articles/azure-netapp-files/customer-managed-keys-cross-tenant.md

Lines changed: 87 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: b-ahibbard
66
ms.service: azure-netapp-files
77
ms.topic: how-to
88
ms.custom: devx-track-azurecli, devx-track-azurepowershell
9-
ms.date: 09/03/2025
9+
ms.date: 02/17/2026
1010
ms.author: anfdocs
1111
# Customer intent: As an IT administrator managing Azure resources across multiple tenants, I want to configure cross-tenant customer-managed keys for volume encryption in Azure NetApp Files, so that I can enhance security and control over encryption keys used for sensitive data.
1212
---
@@ -91,10 +91,22 @@ The configuration process for cross-tenant customer-managed keys has portions th
9191

9292
### Configure the NetApp account to use your keys
9393

94-
>[!NOTE]
95-
>Using the `az rest` command is the only supported way to configure your NetApp account to use CMK in a different tenant.
94+
> [!IMPORTANT]
95+
> If the NetApp account is configured with same-tenant customer-managed keys, you must switch the account back to Microsoft-managed keys before configuring cross-tenant CMK. To switch, navigate to **Encryption** in the Azure portal and change the encryption key source to **Microsoft-managed key**.
9696
97-
<!-- check API version preview -->
97+
#### [Portal](#tab/portal-configure)
98+
99+
1. In the Azure portal, navigate to your NetApp account and select **Encryption**.
100+
1. Select **Customer-managed key** as the encryption key source.
101+
1. Under **Key URI**, select **Enter key URI** and provide the URI of the encryption key.
102+
1. Under **Identity type**, select **User-assigned**.
103+
1. Select **Select an identity**, then choose the user-assigned managed identity.
104+
1. Under **Federated client ID**, enter the application (client) ID of the multitenant application.
105+
1. Select **Save**.
106+
107+
Verify that `federatedClientId` is present in the encryption properties.
108+
109+
#### [Azure CLI](#tab/cli-configure)
98110

99111
1. With the `az rest` command, configure the NetApp account to use CMK in a different tenant:
100112

@@ -120,17 +132,84 @@ The configuration process for cross-tenant customer-managed keys has portions th
120132
```
121133
Once you have sent the `az rest` command, your NetApp Account has been successfully configured with cross-tenant CMK.
122134
135+
Verify the configuration by running:
136+
137+
```azurecli
138+
az netappfiles account show --resource-group <resourceGroupName> --name <NetAppAccountName> --query "{encryption: properties.encryption}" -o json
139+
```
140+
141+
The output should include `federatedClientId` in the encryption identity properties.
142+
143+
---
144+
123145
### Create a volume
124146
125-
>[!NOTE]
126-
>To create a volume using cross-tenant CMK, you must use the Azure CLI.
147+
#### [Portal](#tab/portal-volume)
148+
149+
1. In the Azure portal, select **Volumes** and then select **Add volume**.
150+
1. Follow the instructions in [Configure network features for an Azure NetApp Files volume](configure-network-features.md):
151+
* [Set the Network Features option in volume creation page](configure-network-features.md#set-the-network-features-option).
152+
* The network security group for the volume's delegated subnet must allow incoming traffic from NetApp's storage VM.
153+
1. For a NetApp account configured with cross-tenant customer-managed keys, perform the following steps:
154+
* Select **Customer-Managed Key** in the **Encryption Key Source** dropdown menu.
155+
* Select **Standard** as the **Network features** option.
156+
* Select a **key vault private endpoint**.
157+
1. Continue to complete the volume creation process. Refer to:
158+
* [Create an NFS volume](azure-netapp-files-create-volumes.md)
159+
* [Create an SMB volume](azure-netapp-files-create-volumes-smb.md)
160+
* [Create a dual-protocol volume](create-volumes-dual-protocol.md)
161+
162+
#### [Azure CLI](#tab/cli-volume)
127163
128-
1. Create the volume using the CLI:
164+
Create the volume using the CLI:
129165
130166
```azurecli
131167
az netappfiles volume create -g <resource group name> --account-name <NetApp account name> --pool-name <pool name> --name <volume name> -l southcentralus --service-level premium --usage-threshold 100 --file-path "<file path>" --vnet <virtual network name> --subnet default --network-features Standard --encryption-key-source Microsoft.KeyVault --kv-private-endpoint-id <full resource ID to the private endpoint to the customer's vault> --debug
132168
```
133169

170+
---
171+
172+
## Troubleshoot cross-tenant customer-managed keys
173+
174+
This section describes issues encountered when configuring cross-tenant CMK and the information to resolve them.
175+
176+
### Verify cross-tenant CMK configuration
177+
178+
To confirm whether a NetApp account is correctly configured for cross-tenant CMK, check for the presence of `federatedClientId` in the account's encryption properties.
179+
180+
#### [Portal](#tab/portal-CMK)
181+
182+
Navigate to your NetApp account, select **Overview**, then select **JSON View**.
183+
184+
If cross-tenant CMK is correctly configured, the encryption properties should include `federatedClientId`.
185+
186+
#### [Azure CLI](#tab/cli-CMK)
187+
188+
Run the following command:
189+
190+
```azurecli
191+
az netappfiles account show \
192+
--resource-group <resourceGroupName> \
193+
--name <NetAppAccountName> \
194+
--query "{keySource: encryption.keySource, federatedClientId: encryption.identity.federatedClientId, userAssignedIdentity: encryption.identity.userAssignedIdentity}" \
195+
-o json
196+
```
197+
If `federatedClientId` is missing, the account is configured with the same-tenant CMK and not with cross-tenant CMK.
198+
199+
---
200+
201+
### Missing Key URI or Encryption Key Source option
202+
203+
**Symptom:** When creating a volume in the Azure portal, the **Encryption Key Source** dropdown menu doesn't show **Customer-Managed Key**, or fields for **Key URI**, **subscription**, or **identity type** aren't visible.
204+
205+
**Resolution:**
206+
1. Verify if the NetApp account is correctly configured for cross-tenant CMK as described in [Verify cross-tenant CMK configuration](#verify-cross-tenant-cmk-configuration).
207+
1. If the account does not have `federatedClientId`, switch the account to Microsoft-managed keys:
208+
1. In the Azure portal, navigate to the **Encryption** page.
209+
1. Change the encryption key source to **Microsoft-managed key**.
210+
1. Select **Save**.
211+
1. Reconfigure the account for cross-tenant CMK by following the steps in [Configure the NetApp account to use your keys](#configure-the-netapp-account-to-use-your-keys).
212+
134213
## Next steps
135214
* [Configure customer-managed keys](configure-customer-managed-keys.md)
136-
* [Understand data encryption in Azure NetApp Files](understand-data-encryption.md)
215+
* [Understand data encryption in Azure NetApp Files](understand-data-encryption.md)

0 commit comments

Comments
 (0)