Skip to content

Commit 87c9dd8

Browse files
authored
Merge pull request #6100 from mestew/patch-1
Update Set-AzureRmVMDiskEncryptionExtension.md
2 parents 29fe5bc + 13dc19d commit 87c9dd8

File tree

2 files changed

+14
-10
lines changed

2 files changed

+14
-10
lines changed

src/ResourceManager/Compute/Commands.Compute/help/Set-AzureRmVMDiskEncryptionExtension.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -114,8 +114,8 @@ $KeyVaultResourceId = $KeyVault.ResourceId
114114
$CertPath = "C:\certificates\examplecert.pfx"
115115
$CertPassword = "Password"
116116
$Cert = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2($CertPath, $CertPassword)
117-
$KeyValue = [System.Convert]::ToBase64String($cert.GetRawCertData())
118-
$AzureAdApplication = New-AzureRmADApplication -DisplayName "<Your Application Display Name>" -HomePage "<https://YourApplicationHomePage>" -IdentifierUris "<https://YouApplicationUri>" -KeyValue $KeyValue -KeyType AsymmetricX509Cert
117+
$CertValue = [System.Convert]::ToBase64String($cert.GetRawCertData())
118+
$AzureAdApplication = New-AzureRmADApplication -DisplayName "<Your Application Display Name>" -HomePage "<https://YourApplicationHomePage>" -IdentifierUris "<https://YouApplicationUri>" -CertValue $CertValue
119119
$ServicePrincipal = New-AzureRmADServicePrincipal -ApplicationId $AzureAdApplication.ApplicationId
120120
121121
$AADClientID = $AzureAdApplication.ApplicationId
@@ -165,6 +165,7 @@ $KeyVault = Get-AzureRmKeyVault -VaultName $VaultName -ResourceGroupName $RGName
165165
$DiskEncryptionKeyVaultUrl = $KeyVault.VaultUri
166166
$KeyVaultResourceId = $KeyVault.ResourceId
167167
168+
$KEKName = "MyKeyEncryptionKey"
168169
$KEK = Add-AzureKeyVaultKey -VaultName $VaultName -Name $KEKName -Destination "Software"
169170
$KeyEncryptionKeyUrl = $KEK.Key.kid
170171
@@ -182,15 +183,16 @@ $VaultName= "MyKeyVault"
182183
$KeyVault = Get-AzureRmKeyVault -VaultName $VaultName -ResourceGroupName $RGName
183184
$DiskEncryptionKeyVaultUrl = $KeyVault.VaultUri
184185
$KeyVaultResourceId = $KeyVault.ResourceId
186+
$KEKName = "MyKeyEncryptionKey"
185187
$KEK = Add-AzureKeyVaultKey -VaultName $VaultName -Name $KEKName -Destination "Software"
186188
$KeyEncryptionKeyUrl = $KEK.Key.kid
187189
188190
# create Azure AD application and associate the certificate
189191
$CertPath = "C:\certificates\examplecert.pfx"
190192
$CertPassword = "Password"
191193
$Cert = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2($CertPath, $CertPassword)
192-
$KeyValue = [System.Convert]::ToBase64String($cert.GetRawCertData())
193-
$AzureAdApplication = New-AzureRmADApplication -DisplayName "<Your Application Display Name>" -HomePage "<https://YourApplicationHomePage>" -IdentifierUris "<https://YouApplicationUri>" -KeyValue $KeyValue -KeyType AsymmetricX509Cert
194+
$CertValue = [System.Convert]::ToBase64String($cert.GetRawCertData())
195+
$AzureAdApplication = New-AzureRmADApplication -DisplayName "<Your Application Display Name>" -HomePage "<https://YourApplicationHomePage>" -IdentifierUris "<https://YouApplicationUri>" -CertValue $CertValue
194196
$ServicePrincipal = New-AzureRmADServicePrincipal -ApplicationId $AzureAdApplication.ApplicationId
195197
196198
$AADClientID = $AzureAdApplication.ApplicationId
@@ -221,7 +223,7 @@ $VM = Add-AzureRmVMSecret -VM $VM -SourceVaultId $SourceVaultId -CertificateStor
221223
Update-AzureRmVM -VM $VM -ResourceGroupName $RGName
222224
223225
#Enable encryption on the virtual machine using Azure AD client ID and client cert thumbprint
224-
Set-AzureRmVMDiskEncryptionExtension -ResourceGroupName $RGname -VMName $VMName -AadClientID $AADClientID -AadClientCertThumbprint $AADClientCertThumbprint -DiskEncryptionKeyVaultUrl $DiskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $KeyVaultResourceId
226+
Set-AzureRmVMDiskEncryptionExtension -ResourceGroupName $RGname -VMName $VMName -AadClientID $AADClientID -AadClientCertThumbprint $AADClientCertThumbprint -DiskEncryptionKeyVaultUrl $DiskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $KeyVaultResourceId -KeyEncryptionKeyUrl $KeyEncryptionKeyUrl -KeyEncryptionKeyVaultId $KeyVaultResourceId
225227
```
226228

227229
This example enables encryption using Azure AD client ID, client cert thumbprint, and wrap disk encryption key by using key encryption key.

src/ResourceManager/Compute/Stack/Commands.Compute/help/Set-AzureRmVMDiskEncryptionExtension.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -70,8 +70,8 @@ $KeyVaultResourceId = $KeyVault.ResourceId
7070
$CertPath = "C:\certificates\examplecert.pfx"
7171
$CertPassword = "Password"
7272
$Cert = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2($CertPath, $CertPassword)
73-
$KeyValue = [System.Convert]::ToBase64String($cert.GetRawCertData())
74-
$AzureAdApplication = New-AzureRmADApplication -DisplayName "<Your Application Display Name>" -HomePage "<https://YourApplicationHomePage>" -IdentifierUris "<https://YouApplicationUri>" -KeyValue $KeyValue -KeyType AsymmetricX509Cert
73+
$CertValue = [System.Convert]::ToBase64String($cert.GetRawCertData())
74+
$AzureAdApplication = New-AzureRmADApplication -DisplayName "<Your Application Display Name>" -HomePage "<https://YourApplicationHomePage>" -IdentifierUris "<https://YouApplicationUri>" -CertValue $CertValue
7575
$ServicePrincipal = New-AzureRmADServicePrincipal -ApplicationId $AzureAdApplication.ApplicationId
7676
7777
$AADClientID = $AzureAdApplication.ApplicationId
@@ -121,6 +121,7 @@ $KeyVault = Get-AzureRmKeyVault -VaultName $VaultName -ResourceGroupName $RGName
121121
$DiskEncryptionKeyVaultUrl = $KeyVault.VaultUri
122122
$KeyVaultResourceId = $KeyVault.ResourceId
123123
124+
$KEKName = "MyKeyEncryptionKey"
124125
$KEK = Add-AzureKeyVaultKey -VaultName $VaultName -Name $KEKName -Destination "Software"
125126
$KeyEncryptionKeyUrl = $KEK.Key.kid
126127
@@ -138,15 +139,16 @@ $VaultName= "MyKeyVault"
138139
$KeyVault = Get-AzureRmKeyVault -VaultName $VaultName -ResourceGroupName $RGName
139140
$DiskEncryptionKeyVaultUrl = $KeyVault.VaultUri
140141
$KeyVaultResourceId = $KeyVault.ResourceId
142+
$KEKName = "MyKeyEncryptionKey"
141143
$KEK = Add-AzureKeyVaultKey -VaultName $VaultName -Name $KEKName -Destination "Software"
142144
$KeyEncryptionKeyUrl = $KEK.Key.kid
143145
144146
# create Azure AD application and associate the certificate
145147
$CertPath = "C:\certificates\examplecert.pfx"
146148
$CertPassword = "Password"
147149
$Cert = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2($CertPath, $CertPassword)
148-
$KeyValue = [System.Convert]::ToBase64String($cert.GetRawCertData())
149-
$AzureAdApplication = New-AzureRmADApplication -DisplayName "<Your Application Display Name>" -HomePage "<https://YourApplicationHomePage>" -IdentifierUris "<https://YouApplicationUri>" -KeyValue $KeyValue -KeyType AsymmetricX509Cert
150+
$CertValue = [System.Convert]::ToBase64String($cert.GetRawCertData())
151+
$AzureAdApplication = New-AzureRmADApplication -DisplayName "<Your Application Display Name>" -HomePage "<https://YourApplicationHomePage>" -IdentifierUris "<https://YouApplicationUri>" -CertValue $CertValue
150152
$ServicePrincipal = New-AzureRmADServicePrincipal -ApplicationId $AzureAdApplication.ApplicationId
151153
152154
$AADClientID = $AzureAdApplication.ApplicationId
@@ -177,7 +179,7 @@ $VM = Add-AzureRmVMSecret -VM $VM -SourceVaultId $SourceVaultId -CertificateStor
177179
Update-AzureRmVM -VM $VM -ResourceGroupName $RGName
178180
179181
#Enable encryption on the virtual machine using Azure AD client ID and client cert thumbprint
180-
Set-AzureRmVMDiskEncryptionExtension -ResourceGroupName $RGname -VMName $VMName -AadClientID $AADClientID -AadClientCertThumbprint $AADClientCertThumbprint -DiskEncryptionKeyVaultUrl $DiskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $KeyVaultResourceId
182+
Set-AzureRmVMDiskEncryptionExtension -ResourceGroupName $RGname -VMName $VMName -AadClientID $AADClientID -AadClientCertThumbprint $AADClientCertThumbprint -DiskEncryptionKeyVaultUrl $DiskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $KeyVaultResourceId -KeyEncryptionKeyUrl $KeyEncryptionKeyUrl -KeyEncryptionKeyVaultId $KeyVaultResourceId
181183
```
182184

183185
This example enables encryption using Azure AD client ID, client cert thumbprint, and wrap disk encryption key by using key encryption key.

0 commit comments

Comments
 (0)