Configure Azure Key Vault as Bring Your Own Key Provider
Last updated
Was this helpful?
Last updated
Was this helpful?
Azure Administrative Access: Confirm that you have administrative access to Microsoft Azure and that the Azure CLI is installed on your system.
FenixPyre Portal Administrative Access: Verify that you have administrative access to the FenixPyre portal to configure encryption key provider settings.
Azure Key Vault Managed HSM (Hardware Security Module) is a fully managed, single-tenant, highly available, and standards-compliant cloud service that safeguards cryptographic keys using FIPS 140-2 Level 3 validated HSMs.
Navigate to the Home page on the Azure portal.
Select Azure Key Vault Managed HSMs from the menu.
Click on Create to start setting up your HSM.
Choose the ideal region for your organization, such as East US. Assign a descriptive name to your HSM. Under Subscription, select Pay As You Go.
Assign an administrator to manage the HSM.
Click Create to complete the setup process.
Verify that the provisioning status shows Succeeded, indicating the HSM was created successfully.
Activate Azure Key Vault Managed HSM
Before using the HSM, activation is required. During activation, data plane commands (e.g., creating keys or assigning roles) are disabled. Only administrators assigned during HSM creation can perform activation.
Generate RSA Key-Pairs:
You need to generate at least three (up to ten) RSA key-pairs. The minimum number required to decrypt the security domain is known as a quorum.
Generate RSA Key-Pairs Using OpenSSL: Run the following commands to create three self-signed certificates:
Download the Security Domain: Use the RSA public keys to download the security domain:
Complete Activation:
Once the command executes successfully, your HSM will activate.
Allow a few minutes for activation to complete.
Important: Store the RSA key pairs and the security domain file securely for future use, such as disaster recovery or setting up another HSM sharing the same security domain.
Register an Application in Azure for FenixPyre
Log in to the Azure Portal: Access the Azure portal and sign in.
Navigate to Microsoft Entra ID: Select Microsoft Entra ID from the menu.
Open App Registrations: Click + Add and then select App Registration.
Register a New App: Provide a name for your app and click Create to register it.
Create a client secret
In the app settings, navigate to Certificates & Secrets.
Click + New Client Secret, provide a description, and click Add.
Copy and store the client secret securely as it will only be shown once.
Configure Role-Based Access Control (RBAC) for Azure Key Vault Managed HSM
Access Managed HSM: In the Azure portal, open the HSM you created.
Open the RBAC Tab: Select the RBAC tab.
Create Local RBAC: Click the + icon to create a new role assignment. Select Managed HSM Crypto User under Roles and All keys under Scope.
Select Security Principal: Click Select Security Principal and choose Enterprise Applications. Then, select your previously registered app.
Finalize RBAC Setup: Complete the role assignment process to grant the appropriate permissions to the app.
Finalize the Encryption Key Provider Setup in FenixPyre
Assign a Vault Name: In the FenixPyre portal, provide a unique and descriptive name for your vault.
Copy HSM URI: Copy the HSM URI from the Azure HSM overview page.
Copy Client ID and Tenant ID: Retrieve the Client ID and Tenant ID from your registered app.
Use Client Secret: Use the client secret you copied earlier.
Verify and Finalize Setup in FenixPyre: In the FenixPyre dashboard, paste the HSM URI, Client ID, Tenant ID, and Client Secret. Click Verify, then Create to finalize the setup.
By following these steps, you will have successfully set up and integrated Azure Key Vault Managed HSM with FenixPyre.