You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Customer intent: As a managed HSM administrator, I want to authorize Azure Resource Manager to perform key management operations via Azure Managed HSM
@@ -23,13 +23,13 @@ Azure Managed HSM doesn't trust Azure Resource Manager by default. However, for
23
23
For the Azure portal or Azure Resource Manager to interact with Azure Managed HSM in the same way as Azure Key Vault Standard and Premium, an authorized Managed HSM administrator must allow Azure Resource Manager to act on behalf of the user. To change this behavior and allow users to use Azure portal or Azure Resource Manager to create new keys or list keys, make the following Azure Managed HSM setting update:
24
24
25
25
```azurecli-interactive
26
-
az keyvault setting update --hsm-name <managed-hsmname> --name AllowKeyManagementOperationsThroughARM --value true
26
+
az keyvault setting update --hsm-name <hsm-name> --name AllowKeyManagementOperationsThroughARM --value true
27
27
```
28
28
29
29
To disable this trust and revert to the default behavior of Managed HSM:
30
30
31
31
```azurecli-interactive
32
-
az keyvault setting update --hsm-name <managed-hsmname> --name AllowKeyManagementOperationsThroughARM --value false
32
+
az keyvault setting update --hsm-name <hsm-name> --name AllowKeyManagementOperationsThroughARM --value false
description: Learn how to integrate Azure Managed HSM with Azure Policy
4
4
author: msmbaldwin
5
5
ms.author: mbaldwin
6
-
ms.date: 04/15/2025
6
+
ms.date: 03/26/2026
7
7
ms.service: azure-key-vault
8
8
ms.subservice: managed-hsm
9
9
ms.custom: devx-track-azurecli
@@ -72,15 +72,15 @@ az ad sp show --id a1b76039-a76c-499f-a2dd-846b4cc32627 --query id
72
72
Copy the `id` printed and paste it in the following command:
73
73
74
74
```azurecli-interactive
75
-
az keyvault role assignment create --scope / --role "Managed HSM Crypto Auditor" --assignee-object-id "the id printed in previous command" --hsm-name <hsmname>
75
+
az keyvault role assignment create --scope / --role "Managed HSM Crypto Auditor" --assignee-object-id "the id printed in previous command" --hsm-name <hsm-name>
76
76
```
77
77
78
78
On Linux or Windows Subsystem of Linux:
79
79
80
80
```azurecli-interactive
81
81
spId=$(az ad sp show --id a1b76039-a76c-499f-a2dd-846b4cc32627 --query id|cut -d "\"" -f2)
82
82
echo $spId
83
-
az keyvault role assignment create --scope / --role "Managed HSM Crypto Auditor" --assignee-object-id $spId --hsm-name <hsmname>
83
+
az keyvault role assignment create --scope / --role "Managed HSM Crypto Auditor" --assignee-object-id $spId --hsm-name <hsm-name>
Copy file name to clipboardExpand all lines: articles/key-vault/managed-hsm/logging.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.author: mbaldwin
7
7
ms.service: azure-key-vault
8
8
ms.subservice: managed-hsm
9
9
ms.topic: tutorial
10
-
ms.date: 12/03/2025
10
+
ms.date: 03/26/2026
11
11
#Customer intent: As a Managed HSM administrator, I want to enable logging for my Managed HSM so I can monitor how and when my HSMs are accessed, and by who.
12
12
---
13
13
@@ -179,9 +179,9 @@ Individual blobs are stored as text, formatted as JSON. Here's an example log en
To create a Managed HSM, you need your Microsoft Entra principal ID. To get your ID, use the Azure PowerShell [Get-AzADUser](/powershell/module/az.resources/get-azaduser) cmdlet, and pass your email address to the `UserPrincipalName` parameter:
0 commit comments