Bring Your Own Key for Microsoft Azure Key Vault and Entrust KeyControl: Integration Guide
Table of Contents
- Introduction
-
Procedures
- Install and configure Entrust KeyControl
- Create and configure an Azure Key Vault application
- Register the Azure Key Vault application
- Create an Azure client secret
- Set Azure Key Vault permissions for BYOK
- Create an Azure CSP account
- Create a key set in KeyControl
- Create a cloud key in KeyControl
- Create a cloud key in Azure Key Vault
- Remove a cloud key in KeyControl
- Delete a cloud key in KeyControl
- Cancel a cloud key deletion in KeyControl
- Rotate a cloud key in KeyControl
Introduction
This document describes the integration of Microsoft Azure Key Vault Bring Your Own Key (referred to as Azure BYOK in this guide) with the Entrust KeyControl Key Management Solution (KMS).
Documents to read first
This guide describes how to configure the Entrust KeyControl server as a KMS in Azure BYOK.
Note
|
Entrust KeyControl v5.5 supports BYOK as an add-on. You can request a free trial of Entrust KeyControl BYOK here: https://go.entrust.com/keycontrol-byok-30-day-free-trial . |
To install and configure the Entrust KeyControl server see KeyControl Installation and Upgrade Guide .
Also refer to the documentation and set-up process for Microsoft Azure BYOK in the Microsoft Azure Key Vault online documentation .
Product configurations
Entrust has successfully tested the integration of KeyControl with Azure BYOK in the following configurations:
System | Version |
---|---|
Entrust KeyControl |
5.5 |
Features tested
Entrust has successfully tested the following features:
Feature | Tested |
---|---|
Create cloud key |
✓ |
Delete cloud key |
✓ |
Remove cloud key |
✓ |
Cancel cloud key deletion |
✓ |
Cloud key rotation |
✓ |
Procedures
Follow these steps to install and configure KeyControl with VSP.
Install and configure Entrust KeyControl
Follow the installation and set-up instructions in KeyControl Installation and Upgrade Guide .
Once KeyControl is set up, you can continue with the integration.
Create and configure an Azure Key Vault application
To create and configure an Azure Key Vault application:
-
Create an Azure Key Vault application. For example:
-
Set the permissions for the BYOK service application. To do, this, open the Access Policies and select All in Key Permissions , Secrets Permissions , and Certificate Permissions . For example:
-
Select Home > Subscriptions and then select your subscription.
-
In Access control (IAM) , select the Role assignments tab.
-
Select the Reader role.
NoteThe Owner permission of the subscription is required to perform this operation. For example:
See the following link for additional information Creating a service principal .
Register the Azure Key Vault application
To register the Azure Key Vault application:
-
Navigate to Azure Active Directory > App Registrations .
-
Select New registration .
The Register an application page appears.
-
Create the BYOK service application with the following parameters:
-
For Name , enter azurebyokkeycontrol .
-
For Supported account types , select Accounts in this organizational directory only (Entrust only - Single tenant) .
For example:
-
-
Select Register .
-
Navigate to Azure Active Directory > App Registrations > azurebyokkeycontrol > API permissions .
-
Select Add a permission and add the following permissions:
-
For Azure Key Vault , select Delegated permissions and select user-impersonation . For example:
-
For Azure Service Management , select Delegate permissions and select user-impersonation .
-
For Microsoft Graph , select Delegate permissions and select both User.Read and Application.ReadWrite.All .
-
-
Select Add permissions .
The permissions update. For example:
See the following link for additional information Creating a service application in Azure Portal .
Create an Azure client secret
To create an Azure client secret:
-
Navigate to Home > Azure Active Directory > App registrations > azurebyokkeycontrol > Certificates & secrets .
-
Select New client secret .
-
Add the Description and the date on which the secret Expires . The recommended period is 24 months. For example:
NoteYou must update the secret key in KeyControl before the expiration date to ensure uninterrupted access to Azure Key vaults. -
Copy the Value of the new client secret.
NoteThis value appears in Azure Portal only temporarily. When the portal hides the client secret, it cannot be retrieved and a new secret will need to be created.
See the following link for additional information Creating a client secret in Azure Active Directory .
Set Azure Key Vault permissions for BYOK
To set Azure Key Vault permissions for BYOK:
-
Navigate to Home > Key vault > azure-byok-keycontrol > Access policies .
-
Select Add access policy .
The Add access policy dialog appears.
-
In the Add access policy dialog:
-
For Key permissions , select All .
-
For Secret permissions , select All .
-
For Certificate permissions , select All .
-
For Select principal , add azurebyokkeycontrol .
For example:
-
-
Select Add .
The permissions update. For example:
See the following link for additional information Set permission for the BYOK service by configuring each Azure Key Vault .
Create an Azure CSP account
To create an Azure CSP account:
-
Navigate to Home > Azure Active Directory > App registrations > azurebyokkeycontrol .
-
Save the following:
-
Application (client) ID
-
Directory (tenant) ID
-
-
Select Home > Subscriptions and then select your subscription.
-
Save the following:
-
Subscription ID
-
See the following link for additional information Creating a CSP account in Azure .
Create a key set in KeyControl
To create a key set in KeyControl:
-
In KeyControl, select BYOK on the main toolbar.
-
Select the Key Sets tab.
-
Select Actions > Create Key Set .
The Create Key Set dialog appears.
-
Enter a Name and Description for the key set. For example:
-
Select Continue .
-
Select the CSP Account tab.
-
If no accounts exist, select Add CSP Account .
The Add CSP Account dialog appears.
-
In the Details tab, enter the information saved during the Create an Azure CSP account process. For example:
-
Select Apply .
-
In the CSP Account tab, select the new CSP account. For example:
-
Select Continue .
-
In the HSM tab, check if an HSM is configured. For example:
If no HSM is configured, configure one before enabling it in this dialog.
-
Select Continue .
-
In the Schedule tab, select a Rotation Schedule matching the selection made during Create an Azure client secret . For example:
-
Select Apply .
The key set is added. For example:
-
Verify the Azure Key Vault setting Accessible is set to Yes . For example:
For additional information, see Creating a Key Set .
Create a cloud key in KeyControl
To create a cloud key:
-
In KeyControl, select BYOK on the toolbar.
-
Select the CloudKeys tab.
-
Select the Key Set and Key Vault . For example:
-
Select Actions > Create CloudKey .
The Create CloudKey dialog appears.
-
In the Details tab, enter the Name and Description . For example:
-
Select Continue .
-
In the Access tab, select the required Cipher . For example:
-
Select Continue .
-
In the Schedule tab:
-
Select a Rotation Schedule .
-
Set an Activation Date .
-
Set Expiration .
For example:
-
-
Select Continue .
The cloud key is created.
-
Verify the cloud key is visible in Azure key vault.
See the following link for additional information Creating a CloudKey .
Create a cloud key in Azure Key Vault
To create a cloud key in Azure Key Vault:
-
Navigate to Home > Key vaults > azure-byok-keycontrol > Keys > Generate/Import .
The Create a key dialog appears.
-
Enter the Name and select all that applies. For example:
-
Select Create .
The cloud key is created.
-
Verify the newly created key. For example:
Import the cloud key in KeyControl:
-
Select BYOK on the toolbar.
-
Select the Key Sets tab and select azurebyokkeycontrol .
-
Select Actions > Import CloudKey .
The Import Cloud Keys dialog appears.
-
Select a Key Vault . For example:
-
Select Import .
The key is imported.
-
Select the CloudKeys tab and select Refresh .
-
Verify the imported key. For example:
Remove a cloud key in KeyControl
To remove a cloud key in KeyControl:
-
In KeyControl, select BYOK on the main toolbar.
-
Select the CloudKeys tab.
-
Select the key to the removed. For example, azurebyokkeycontrol-createdInKeyControl .
-
Select Actions > Remove from Cloud .
The Remove from Cloud dialog appears.
-
Type the name of the key in Type CloudKey Name . For example:
-
Select Remove .
The cloud key is removed from KeyControl. Its Cloud Status becomes NOT AVAILABLE . For example:
-
Verify the key is gone in Azure. For example:
For additional information, see Removing a CloudKey from the Cloud .
Delete a cloud key in KeyControl
To delete a cloud key in KeyControl:
-
In KeyControl, select BYOK on the toolbar.
-
Select the CloudKeys tab.
-
Select the key to the removed. For example, azurebyokkeycontrol-createdInKeyControl .
-
Select Actions > Delete CloudKey .
The Delete CloudKey dialog appears.
-
Select a time in Define when the CloudKey should be permanently deleted . For example:
-
Select Delete .
The cloud key is deleted from KeyControl. The Cloud Status becomes PENDING DELETE . For example:
-
Verify the key is gone in Azure. For example:
For additional information, see Deleting a CloudKey .
Cancel a cloud key deletion in KeyControl
To cancel a cloud key deletion in KeyControl:
-
In KeyControl, select BYOK on the toolbar.
-
Select the CloudKeys tab.
-
Select the key for which you want to cancel a deletion. For example, azurebyokkeycontrol-createdInAzure .
-
Select Actions > Cancel Deletion .
The Cancel Deletion dialog appears. For example:
-
Select Cancel Delete .
The deletion is cancelled.
-
Verify the status change in KeyControl. For example:
-
Verify the key is now available in Azure. For example:
For additional information, see Canceling a CloudKey Deletion .
Rotate a cloud key in KeyControl
To rotate a cloud key in KeyControl:
-
In KeyControl, select BYOK on the toolbar.
-
Select the CloudKeys tab.
-
Select the key you want to rotate. Then, scroll down until you see the Rotate Now control. For example:
-
Select Rotate Now .
The key is rotated.
-
In Azure, navigate to Home > Key vaults > azure-byok-keycontrol > Keys > Key Name .
-
Verify that the key has been rotated. For example:
-
ProductsKeyControl BYOK
-
ProductsnShield Connect
-
ProductsnShield as a Service