@@ -114,8 +114,8 @@ $KeyVaultResourceId = $KeyVault.ResourceId
114
114
$CertPath = "C:\certificates\examplecert.pfx"
115
115
$CertPassword = "Password"
116
116
$Cert = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2($CertPath, $CertPassword)
117
- $KeyValue = [System.Convert]::ToBase64String($cert.GetRawCertData())
118
- $AzureAdApplication = New-AzureRmADApplication -DisplayName "<Your Application Display Name>" -HomePage "<https://YourApplicationHomePage>" -IdentifierUris "<https://YouApplicationUri>" -KeyValue $KeyValue -KeyType AsymmetricX509Cert
117
+ $CertValue = [System.Convert]::ToBase64String($cert.GetRawCertData())
118
+ $AzureAdApplication = New-AzureRmADApplication -DisplayName "<Your Application Display Name>" -HomePage "<https://YourApplicationHomePage>" -IdentifierUris "<https://YouApplicationUri>" -CertValue $CertValue
119
119
$ServicePrincipal = New-AzureRmADServicePrincipal -ApplicationId $AzureAdApplication.ApplicationId
120
120
121
121
$AADClientID = $AzureAdApplication.ApplicationId
@@ -165,6 +165,7 @@ $KeyVault = Get-AzureRmKeyVault -VaultName $VaultName -ResourceGroupName $RGName
165
165
$DiskEncryptionKeyVaultUrl = $KeyVault.VaultUri
166
166
$KeyVaultResourceId = $KeyVault.ResourceId
167
167
168
+ $KEKName = "MyKeyEncryptionKey"
168
169
$KEK = Add-AzureKeyVaultKey -VaultName $VaultName -Name $KEKName -Destination "Software"
169
170
$KeyEncryptionKeyUrl = $KEK.Key.kid
170
171
@@ -182,15 +183,16 @@ $VaultName= "MyKeyVault"
182
183
$KeyVault = Get-AzureRmKeyVault -VaultName $VaultName -ResourceGroupName $RGName
183
184
$DiskEncryptionKeyVaultUrl = $KeyVault.VaultUri
184
185
$KeyVaultResourceId = $KeyVault.ResourceId
186
+ $KEKName = "MyKeyEncryptionKey"
185
187
$KEK = Add-AzureKeyVaultKey -VaultName $VaultName -Name $KEKName -Destination "Software"
186
188
$KeyEncryptionKeyUrl = $KEK.Key.kid
187
189
188
190
# create Azure AD application and associate the certificate
189
191
$CertPath = "C:\certificates\examplecert.pfx"
190
192
$CertPassword = "Password"
191
193
$Cert = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2($CertPath, $CertPassword)
192
- $KeyValue = [System.Convert]::ToBase64String($cert.GetRawCertData())
193
- $AzureAdApplication = New-AzureRmADApplication -DisplayName "<Your Application Display Name>" -HomePage "<https://YourApplicationHomePage>" -IdentifierUris "<https://YouApplicationUri>" -KeyValue $KeyValue -KeyType AsymmetricX509Cert
194
+ $CertValue = [System.Convert]::ToBase64String($cert.GetRawCertData())
195
+ $AzureAdApplication = New-AzureRmADApplication -DisplayName "<Your Application Display Name>" -HomePage "<https://YourApplicationHomePage>" -IdentifierUris "<https://YouApplicationUri>" -CertValue $CertValue
194
196
$ServicePrincipal = New-AzureRmADServicePrincipal -ApplicationId $AzureAdApplication.ApplicationId
195
197
196
198
$AADClientID = $AzureAdApplication.ApplicationId
@@ -221,7 +223,7 @@ $VM = Add-AzureRmVMSecret -VM $VM -SourceVaultId $SourceVaultId -CertificateStor
221
223
Update-AzureRmVM -VM $VM -ResourceGroupName $RGName
222
224
223
225
#Enable encryption on the virtual machine using Azure AD client ID and client cert thumbprint
224
- Set-AzureRmVMDiskEncryptionExtension -ResourceGroupName $RGname -VMName $VMName -AadClientID $AADClientID -AadClientCertThumbprint $AADClientCertThumbprint -DiskEncryptionKeyVaultUrl $DiskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $KeyVaultResourceId
226
+ Set-AzureRmVMDiskEncryptionExtension -ResourceGroupName $RGname -VMName $VMName -AadClientID $AADClientID -AadClientCertThumbprint $AADClientCertThumbprint -DiskEncryptionKeyVaultUrl $DiskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $KeyVaultResourceId -KeyEncryptionKeyUrl $KeyEncryptionKeyUrl -KeyEncryptionKeyVaultId $KeyVaultResourceId
225
227
```
226
228
227
229
This example enables encryption using Azure AD client ID, client cert thumbprint, and wrap disk encryption key by using key encryption key.
0 commit comments