You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/key-vault/managed-hsm/backup-restore.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,11 +47,11 @@ To execute a full backup, provide the following information:
47
47
1. Provide **Storage Blob Data Contributor** role access to the user-assigned managed identity created in step 2, by going to the **Access Control** tab on the portal and selecting **Add Role Assignment**. Then select **managed identity** and select the managed identity created in step 2 -> **Review + Assign**
48
48
1. Create the Managed HSM and associate the managed identity:
Copy file name to clipboardExpand all lines: articles/key-vault/managed-hsm/configure-network-security.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,19 +39,19 @@ Here's how to configure Managed HSM firewalls by using the Azure CLI:
39
39
1. Use the [az keyvault update-hsm](/cli/azure/keyvault#az-keyvault-update-hsm) command to set the default action to Deny before creating a firewall.
40
40
41
41
```azurecli
42
-
az keyvault update-hsm --resource-group "ContosoResourceGroup" --hsm-name "ContosoMHSM" --default-action Deny
42
+
az keyvault update-hsm --resource-group "<resource-group>" --hsm-name "<hsm-name>" --default-action Deny
43
43
```
44
44
45
45
1. Use the [az keyvault network-rule add](/cli/azure/keyvault/network-rule#az-keyvault-network-rule-add) command to add an IP address range to allow traffic.
46
46
47
47
```azurecli
48
-
az keyvault network-rule add --resource-group "ContosoResourceGroup" --hsm-name "ContosoMHSM" --ip-address "191.10.18.0/24"
48
+
az keyvault network-rule add --resource-group "<resource-group>" --hsm-name "<hsm-name>" --ip-address "<ip-address-range>"
49
49
```
50
50
51
51
1. If any trusted services need access to this key vault, use the [az keyvault update](/cli/azure/keyvault#az-keyvault-update) command to set bypass to AzureServices.
52
52
53
53
```azurecli
54
-
az keyvault update --resource-group "ContosoResourceGroup" --hsm-name "ContosoMHSM" --bypass AzureServices
54
+
az keyvault update --resource-group "<resource-group>" --hsm-name "<hsm-name>" --bypass AzureServices
55
55
```
56
56
57
57
# [Azure PowerShell](#tab/azure-powershell)
@@ -62,15 +62,15 @@ Here's how to configure Managed HSM firewalls by using PowerShell:
62
62
1. Use the [Update-AzKeyVaultManagedHsmNetworkRuleSet](/powershell/module/az.keyvault/update-azkeyvaultmanagedhsmnetworkruleset) cmdlet to set default action to Deny and add an IP address range to allow traffic.
Include `-ReplaceAllRules` to overwrite IP Lists. Otherwise, the command merges the newly included rules.
69
69
70
70
1. If any trusted services need access to this managed HSM, use the [Update-AzKeyVaultManagedHsmNetworkRuleSet](/powershell/module/az.keyvault/update-azkeyvaultmanagedhsmnetworkruleset) cmdlet to set bypass to AzureServices.
0 commit comments