Skip to content

Commit 13dc19d

Browse files
authored
Update Set-AzureRmVMDiskEncryptionExtension.md
1 parent b00c267 commit 13dc19d

File tree

1 file changed

+7
-5
lines changed

1 file changed

+7
-5
lines changed

src/ResourceManager/Compute/Commands.Compute/help/Set-AzureRmVMDiskEncryptionExtension.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -114,8 +114,8 @@ $KeyVaultResourceId = $KeyVault.ResourceId
114114
$CertPath = "C:\certificates\examplecert.pfx"
115115
$CertPassword = "Password"
116116
$Cert = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2($CertPath, $CertPassword)
117-
$KeyValue = [System.Convert]::ToBase64String($cert.GetRawCertData())
118-
$AzureAdApplication = New-AzureRmADApplication -DisplayName "<Your Application Display Name>" -HomePage "<https://YourApplicationHomePage>" -IdentifierUris "<https://YouApplicationUri>" -KeyValue $KeyValue -KeyType AsymmetricX509Cert
117+
$CertValue = [System.Convert]::ToBase64String($cert.GetRawCertData())
118+
$AzureAdApplication = New-AzureRmADApplication -DisplayName "<Your Application Display Name>" -HomePage "<https://YourApplicationHomePage>" -IdentifierUris "<https://YouApplicationUri>" -CertValue $CertValue
119119
$ServicePrincipal = New-AzureRmADServicePrincipal -ApplicationId $AzureAdApplication.ApplicationId
120120
121121
$AADClientID = $AzureAdApplication.ApplicationId
@@ -165,6 +165,7 @@ $KeyVault = Get-AzureRmKeyVault -VaultName $VaultName -ResourceGroupName $RGName
165165
$DiskEncryptionKeyVaultUrl = $KeyVault.VaultUri
166166
$KeyVaultResourceId = $KeyVault.ResourceId
167167
168+
$KEKName = "MyKeyEncryptionKey"
168169
$KEK = Add-AzureKeyVaultKey -VaultName $VaultName -Name $KEKName -Destination "Software"
169170
$KeyEncryptionKeyUrl = $KEK.Key.kid
170171
@@ -182,15 +183,16 @@ $VaultName= "MyKeyVault"
182183
$KeyVault = Get-AzureRmKeyVault -VaultName $VaultName -ResourceGroupName $RGName
183184
$DiskEncryptionKeyVaultUrl = $KeyVault.VaultUri
184185
$KeyVaultResourceId = $KeyVault.ResourceId
186+
$KEKName = "MyKeyEncryptionKey"
185187
$KEK = Add-AzureKeyVaultKey -VaultName $VaultName -Name $KEKName -Destination "Software"
186188
$KeyEncryptionKeyUrl = $KEK.Key.kid
187189
188190
# create Azure AD application and associate the certificate
189191
$CertPath = "C:\certificates\examplecert.pfx"
190192
$CertPassword = "Password"
191193
$Cert = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2($CertPath, $CertPassword)
192-
$KeyValue = [System.Convert]::ToBase64String($cert.GetRawCertData())
193-
$AzureAdApplication = New-AzureRmADApplication -DisplayName "<Your Application Display Name>" -HomePage "<https://YourApplicationHomePage>" -IdentifierUris "<https://YouApplicationUri>" -KeyValue $KeyValue -KeyType AsymmetricX509Cert
194+
$CertValue = [System.Convert]::ToBase64String($cert.GetRawCertData())
195+
$AzureAdApplication = New-AzureRmADApplication -DisplayName "<Your Application Display Name>" -HomePage "<https://YourApplicationHomePage>" -IdentifierUris "<https://YouApplicationUri>" -CertValue $CertValue
194196
$ServicePrincipal = New-AzureRmADServicePrincipal -ApplicationId $AzureAdApplication.ApplicationId
195197
196198
$AADClientID = $AzureAdApplication.ApplicationId
@@ -221,7 +223,7 @@ $VM = Add-AzureRmVMSecret -VM $VM -SourceVaultId $SourceVaultId -CertificateStor
221223
Update-AzureRmVM -VM $VM -ResourceGroupName $RGName
222224
223225
#Enable encryption on the virtual machine using Azure AD client ID and client cert thumbprint
224-
Set-AzureRmVMDiskEncryptionExtension -ResourceGroupName $RGname -VMName $VMName -AadClientID $AADClientID -AadClientCertThumbprint $AADClientCertThumbprint -DiskEncryptionKeyVaultUrl $DiskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $KeyVaultResourceId
226+
Set-AzureRmVMDiskEncryptionExtension -ResourceGroupName $RGname -VMName $VMName -AadClientID $AADClientID -AadClientCertThumbprint $AADClientCertThumbprint -DiskEncryptionKeyVaultUrl $DiskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $KeyVaultResourceId -KeyEncryptionKeyUrl $KeyEncryptionKeyUrl -KeyEncryptionKeyVaultId $KeyVaultResourceId
225227
```
226228

227229
This example enables encryption using Azure AD client ID, client cert thumbprint, and wrap disk encryption key by using key encryption key.

0 commit comments

Comments
 (0)