You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Customer intent: As an IT administrator managing Azure resources across multiple tenants, I want to configure cross-tenant customer-managed keys for volume encryption in Azure NetApp Files, so that I can enhance security and control over encryption keys used for sensitive data.
12
12
---
@@ -91,10 +91,22 @@ The configuration process for cross-tenant customer-managed keys has portions th
91
91
92
92
### Configure the NetApp account to use your keys
93
93
94
-
>[!NOTE]
95
-
>Using the `az rest` command is the only supported way to configure your NetApp account to use CMKin a different tenant.
94
+
>[!IMPORTANT]
95
+
>If the NetApp account is configured with same-tenant customer-managed keys, you must switch the account back to Microsoft-managed keys before configuring cross-tenant CMK. To switch, navigate to **Encryption**in the Azure portal and change the encryption key source to **Microsoft-managed key**.
96
96
97
-
<!-- check API version preview -->
97
+
#### [Portal](#tab/portal-configure)
98
+
99
+
1. In the Azure portal, navigate to your NetApp account and select **Encryption**.
100
+
1. Select **Customer-managed key** as the encryption key source.
101
+
1. Under **Key URI**, select **Enter key URI** and provide the URI of the encryption key.
102
+
1. Under **Identity type**, select **User-assigned**.
103
+
1. Select **Select an identity**, then choose the user-assigned managed identity.
104
+
1. Under **Federated client ID**, enter the application (client) ID of the multitenant application.
105
+
1. Select **Save**.
106
+
107
+
Verify that `federatedClientId` is present in the encryption properties.
108
+
109
+
#### [Azure CLI](#tab/cli-configure)
98
110
99
111
1. With the `az rest` command, configure the NetApp account to use CMK in a different tenant:
100
112
@@ -120,17 +132,84 @@ The configuration process for cross-tenant customer-managed keys has portions th
120
132
```
121
133
Once you have sent the `az rest` command, your NetApp Account has been successfully configured with cross-tenant CMK.
122
134
135
+
Verify the configuration by running:
136
+
137
+
```azurecli
138
+
az netappfiles account show --resource-group <resourceGroupName> --name <NetAppAccountName> --query "{encryption: properties.encryption}" -o json
139
+
```
140
+
141
+
The output should include `federatedClientId` in the encryption identity properties.
142
+
143
+
---
144
+
123
145
### Create a volume
124
146
125
-
>[!NOTE]
126
-
>To create a volume using cross-tenant CMK, you must use the Azure CLI.
147
+
#### [Portal](#tab/portal-volume)
148
+
149
+
1. In the Azure portal, select **Volumes** and then select **Add volume**.
150
+
1. Follow the instructions in [Configure network features for an Azure NetApp Files volume](configure-network-features.md):
151
+
* [Set the Network Features option in volume creation page](configure-network-features.md#set-the-network-features-option).
152
+
* The network security group for the volume's delegated subnet must allow incoming traffic from NetApp's storage VM.
153
+
1. For a NetApp account configured with cross-tenant customer-managed keys, perform the following steps:
154
+
* Select **Customer-Managed Key** in the **Encryption Key Source** dropdown menu.
155
+
* Select **Standard** as the **Network features** option.
156
+
* Select a **key vault private endpoint**.
157
+
1. Continue to complete the volume creation process. Refer to:
158
+
* [Create an NFS volume](azure-netapp-files-create-volumes.md)
159
+
* [Create an SMB volume](azure-netapp-files-create-volumes-smb.md)
160
+
* [Create a dual-protocol volume](create-volumes-dual-protocol.md)
161
+
162
+
#### [Azure CLI](#tab/cli-volume)
127
163
128
-
1. Create the volume using the CLI:
164
+
Create the volume using the CLI:
129
165
130
166
```azurecli
131
167
az netappfiles volume create -g <resource group name> --account-name <NetApp account name> --pool-name <pool name> --name <volume name> -l southcentralus --service-level premium --usage-threshold 100 --file-path "<file path>" --vnet <virtual network name> --subnet default --network-features Standard --encryption-key-source Microsoft.KeyVault --kv-private-endpoint-id <full resource ID to the private endpoint to the customer's vault> --debug
This section describes issues encountered when configuring cross-tenant CMK and the information to resolve them.
175
+
176
+
### Verify cross-tenant CMK configuration
177
+
178
+
To confirm whether a NetApp account is correctly configured for cross-tenant CMK, check for the presence of `federatedClientId` in the account's encryption properties.
179
+
180
+
#### [Portal](#tab/portal-CMK)
181
+
182
+
Navigate to your NetApp account, select **Overview**, then select **JSON View**.
183
+
184
+
If cross-tenant CMK is correctly configured, the encryption properties should include `federatedClientId`.
If `federatedClientId` is missing, the account is configured with the same-tenant CMK and not with cross-tenant CMK.
198
+
199
+
---
200
+
201
+
### Missing Key URI or Encryption Key Source option
202
+
203
+
**Symptom:** When creating a volume in the Azure portal, the **Encryption Key Source** dropdown menu doesn't show **Customer-Managed Key**, or fields for **Key URI**, **subscription**, or **identity type** aren't visible.
204
+
205
+
**Resolution:**
206
+
1. Verify if the NetApp account is correctly configured for cross-tenant CMK as described in [Verify cross-tenant CMK configuration](#verify-cross-tenant-cmk-configuration).
207
+
1. If the account does not have `federatedClientId`, switch the account to Microsoft-managed keys:
208
+
1. In the Azure portal, navigate to the **Encryption** page.
209
+
1. Change the encryption key source to **Microsoft-managed key**.
210
+
1. Select **Save**.
211
+
1. Reconfigure the account for cross-tenant CMK by following the steps in [Configure the NetApp account to use your keys](#configure-the-netapp-account-to-use-your-keys).
0 commit comments