@@ -70,8 +70,8 @@ $KeyVaultResourceId = $KeyVault.ResourceId
70
70
$CertPath = "C:\certificates\examplecert.pfx"
71
71
$CertPassword = "Password"
72
72
$Cert = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2($CertPath, $CertPassword)
73
- $KeyValue = [System.Convert]::ToBase64String($cert.GetRawCertData())
74
- $AzureAdApplication = New-AzureRmADApplication -DisplayName "<Your Application Display Name>" -HomePage "<https://YourApplicationHomePage>" -IdentifierUris "<https://YouApplicationUri>" -KeyValue $KeyValue -KeyType AsymmetricX509Cert
73
+ $CertValue = [System.Convert]::ToBase64String($cert.GetRawCertData())
74
+ $AzureAdApplication = New-AzureRmADApplication -DisplayName "<Your Application Display Name>" -HomePage "<https://YourApplicationHomePage>" -IdentifierUris "<https://YouApplicationUri>" -CertValue $CertValue
75
75
$ServicePrincipal = New-AzureRmADServicePrincipal -ApplicationId $AzureAdApplication.ApplicationId
76
76
77
77
$AADClientID = $AzureAdApplication.ApplicationId
@@ -121,6 +121,7 @@ $KeyVault = Get-AzureRmKeyVault -VaultName $VaultName -ResourceGroupName $RGName
121
121
$DiskEncryptionKeyVaultUrl = $KeyVault.VaultUri
122
122
$KeyVaultResourceId = $KeyVault.ResourceId
123
123
124
+ $KEKName = "MyKeyEncryptionKey"
124
125
$KEK = Add-AzureKeyVaultKey -VaultName $VaultName -Name $KEKName -Destination "Software"
125
126
$KeyEncryptionKeyUrl = $KEK.Key.kid
126
127
@@ -138,15 +139,16 @@ $VaultName= "MyKeyVault"
138
139
$KeyVault = Get-AzureRmKeyVault -VaultName $VaultName -ResourceGroupName $RGName
139
140
$DiskEncryptionKeyVaultUrl = $KeyVault.VaultUri
140
141
$KeyVaultResourceId = $KeyVault.ResourceId
142
+ $KEKName = "MyKeyEncryptionKey"
141
143
$KEK = Add-AzureKeyVaultKey -VaultName $VaultName -Name $KEKName -Destination "Software"
142
144
$KeyEncryptionKeyUrl = $KEK.Key.kid
143
145
144
146
# create Azure AD application and associate the certificate
145
147
$CertPath = "C:\certificates\examplecert.pfx"
146
148
$CertPassword = "Password"
147
149
$Cert = New-Object System.Security.Cryptography.X509Certificates.X509Certificate2($CertPath, $CertPassword)
148
- $KeyValue = [System.Convert]::ToBase64String($cert.GetRawCertData())
149
- $AzureAdApplication = New-AzureRmADApplication -DisplayName "<Your Application Display Name>" -HomePage "<https://YourApplicationHomePage>" -IdentifierUris "<https://YouApplicationUri>" -KeyValue $KeyValue -KeyType AsymmetricX509Cert
150
+ $CertValue = [System.Convert]::ToBase64String($cert.GetRawCertData())
151
+ $AzureAdApplication = New-AzureRmADApplication -DisplayName "<Your Application Display Name>" -HomePage "<https://YourApplicationHomePage>" -IdentifierUris "<https://YouApplicationUri>" -CertValue $CertValue
150
152
$ServicePrincipal = New-AzureRmADServicePrincipal -ApplicationId $AzureAdApplication.ApplicationId
151
153
152
154
$AADClientID = $AzureAdApplication.ApplicationId
@@ -177,7 +179,7 @@ $VM = Add-AzureRmVMSecret -VM $VM -SourceVaultId $SourceVaultId -CertificateStor
177
179
Update-AzureRmVM -VM $VM -ResourceGroupName $RGName
178
180
179
181
#Enable encryption on the virtual machine using Azure AD client ID and client cert thumbprint
180
- Set-AzureRmVMDiskEncryptionExtension -ResourceGroupName $RGname -VMName $VMName -AadClientID $AADClientID -AadClientCertThumbprint $AADClientCertThumbprint -DiskEncryptionKeyVaultUrl $DiskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $KeyVaultResourceId
182
+ Set-AzureRmVMDiskEncryptionExtension -ResourceGroupName $RGname -VMName $VMName -AadClientID $AADClientID -AadClientCertThumbprint $AADClientCertThumbprint -DiskEncryptionKeyVaultUrl $DiskEncryptionKeyVaultUrl -DiskEncryptionKeyVaultId $KeyVaultResourceId -KeyEncryptionKeyUrl $KeyEncryptionKeyUrl -KeyEncryptionKeyVaultId $KeyVaultResourceId
181
183
```
182
184
183
185
This example enables encryption using Azure AD client ID, client cert thumbprint, and wrap disk encryption key by using key encryption key.
0 commit comments