You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/cloud-hsm/backup-restore.md
+25-25Lines changed: 25 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to back up and restore your Azure Cloud HSM resources, in
4
4
author: msmbaldwin
5
5
ms.service: azure-cloud-hsm
6
6
ms.topic: tutorial
7
-
ms.date: 03/20/2025
7
+
ms.date: 03/26/2026
8
8
ms.author: mbaldwin
9
9
10
10
# Customer intent: As a security administrator, I need to back up and restore Azure Cloud HSM resources to ensure business continuity and facilitate disaster recovery.
@@ -49,10 +49,10 @@ Create a new user-assigned managed identity in your existing Azure Cloud HSM res
49
49
```azurepowershell-interactive
50
50
# Define parameters for the new managed identity
51
51
$identity = @{
52
-
Location = "<RegionName>"
53
-
ResourceName = "<ManagedIdentityName>"
54
-
ResourceGroupName = "<ResourceGroupName>"
55
-
SubscriptionID = "<SubscriptionID>"
52
+
Location = "<location>"
53
+
ResourceName = "<managed-identity-name>"
54
+
ResourceGroupName = "<resource-group>"
55
+
SubscriptionID = "<subscription-id>"
56
56
}
57
57
58
58
# Create a new user-assigned managed identity in the specified resource group and location
@@ -71,21 +71,21 @@ Each Cloud HSM cluster can have only one managed identity. You can use the same
71
71
```azurepowershell-interactive
72
72
# Define the parameters for the source Cloud HSM resource
@@ -118,7 +118,7 @@ The following attributes are applicable to X.509 public key certificates.
118
118
119
119
### C_DestroyObject
120
120
121
-
The C_DestroyObject API takes a session handle, and the object handle associated with the certificate you want to delete. Invoking this function removes the specified certificate from the Azure Blob Storage Account by deleting the corresponding JWS blob named pkcs11_certificate_<cert_handle>.
121
+
The C_DestroyObject API takes a session handle, and the object handle associated with the certificate you want to delete. Invoking this function removes the specified certificate from the Azure Blob Storage Account by deleting the corresponding JWS blob named `pkcs11_certificate_<cert-handle>`.
122
122
123
123
Below is a code snippet demonstrating how to call C_DestroyObject for certificates (the same approach applies to keys).
124
124
@@ -349,7 +349,7 @@ Azure Cloud HSM includes sample application code to help validate certificate st
349
349
350
350
### Verify certificates in storage
351
351
352
-
After a successful call to the C_CreateObject() API, the newly created certificate object will appear in your Azure Blob Storage account, as specified in the azcloudhsm_application.cfg file. The blob will be named using the format pkcs11_certificate_\<ObjectHandle\>, as shown below. Certificate objects are assigned object handles ranging from 0xFFF00000 to 0xFFFFFFFF (decimal range: 4,293,918,720 to 4,294,967,295), allowing support for up to 1,048,575 certificates.
352
+
After a successful call to the C_CreateObject() API, the newly created certificate object will appear in your Azure Blob Storage account, as specified in the azcloudhsm_application.cfg file. The blob will be named using the format `pkcs11_certificate_<object-handle>`, as shown below. Certificate objects are assigned object handles ranging from 0xFFF00000 to 0xFFFFFFFF (decimal range: 4,293,918,720 to 4,294,967,295), allowing support for up to 1,048,575 certificates.
353
353
354
354
From both Azure portal as well as from your Azure VM you can see the certificates stored.
Copy file name to clipboardExpand all lines: articles/cloud-hsm/quickstart-powershell.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: keithp
5
5
manager: keithp
6
6
ms.service: azure-cloud-hsm
7
7
ms.topic: quickstart
8
-
ms.date: 03/20/2025
8
+
ms.date: 03/26/2026
9
9
ms.author: keithp
10
10
11
11
#customer intent: As an IT pro decision-maker, I'm looking for key storage capability within the Azure cloud platform that meets FIPS 140-3 Level 3 certification and that gives me exclusive access to a dedicated hardware security module.
@@ -36,11 +36,11 @@ The following example code creates a resource group and a Cloud HSM instance. Yo
When you run the `New-AzResource` command with the `-AsJob` parameter, it creates a background job to deploy your Cloud HSM resource. You can check the status of the deployment by running:
129
129
130
130
```azurepowershell-interactive
131
-
Get-Job -Id <JobId> | Receive-Job
131
+
Get-Job -Id <job-id> | Receive-Job
132
132
```
133
133
134
-
In the preceding command, `<JobId>` is the ID that the system returned when you ran the `New-AzResource` command.
134
+
In the preceding command, `<job-id>` is the ID that the system returned when you ran the `New-AzResource` command.
135
135
136
136
The deployment is complete when you see a successful result from the job or when you can verify that the resource exists in your Azure subscription.
The PKCS#11 library knows how to find the client configuration because you must have a copy of your partition owner certificate (`PO.crt`) on the application server that's running your application and using the PKCS#11 library. In addition to the partition owner certificate:
186
186
187
-
- You have to update `/azcloudhsm_client/azcloudhsm_client.cfg` on the application server that has the SDK installed to point to your Azure Cloud HSM deployment (that is, `hsm1.chsm-<resourcename>-<uniquestring>.privatelink.cloudhsm.azure.net`).
187
+
- You have to update `/azcloudhsm_client/azcloudhsm_client.cfg` on the application server that has the SDK installed to point to your Azure Cloud HSM deployment (that is, `hsm1.chsm-<resource-name>-<unique-string>.privatelink.cloudhsm.azure.net`).
188
188
- The `azcloudhsm_client` tool must be running on the application server that connects to your Azure Cloud HSM deployment.
189
189
- You must specify a PIN within your PKCS#11 application by using the syntax `<username>:<password>`. This PIN is used for calling `C_Login` to your Azure Cloud HSM deployment.
190
190
- You must include `pkcs11_headers/include/cryptoki.h` and `pkcs11_headers/include/pkcs11t.h` in your PKCS#11 application to use the PKCS#11 library for Azure Cloud HSM.
@@ -193,7 +193,7 @@ The PKCS#11 library knows how to find the client configuration because you must
193
193
194
194
The `azcloudhsm_pkcs11.dll` file in the Azure Cloud HSM Windows SDK knows how to find the client configuration because you must have a copy of your partition owner certificate (`PO.crt`) on the application server that's running your application and using the PKCS#11 library. In addition to the partition owner certificate:
195
195
196
-
- You have to update `/azcloudhsm_client/azcloudhsm_client.cfg` on the application server that has the SDK installed to point to your Azure Cloud HSM deployment (that is, `hsm1.chsm-<resourcename>-<uniquestring>.privatelink.cloudhsm.azure.net`).
196
+
- You have to update `/azcloudhsm_client/azcloudhsm_client.cfg` on the application server that has the SDK installed to point to your Azure Cloud HSM deployment (that is, `hsm1.chsm-<resource-name>-<unique-string>.privatelink.cloudhsm.azure.net`).
197
197
- The `azcloudhsm_client` tool must run on the application server that connects to your Azure Cloud HSM deployment.
198
198
- You must specify a PIN within your PKCS#11 application by using the syntax `<username>:<password>`. This PIN is used for calling `C_Login` to your Azure Cloud HSM deployment.
199
199
- You must include `pkcs11_headers\include\cryptoki.h` and `pkcs11_headers\include\pkcs11t.h` in your PKCS#11 application to use the PKCS#11 library for Azure Cloud HSM.
0 commit comments