Enable Customer Managed Keys for your Organization on Microsoft Azure

Enable Customer Managed Keys for your Organization on Microsoft Azure

Step 4. Allow Informatica’s application to use the key vault

Step 4. Allow Informatica’s application to use the key vault

Allow the Informatica KMS Connect app to use the Azure AD application credentials and tenant ID. To do this, first create an access policy for the Informatica KMS Connect app in Azure Key Vault, and then enter the key information on the
Settings
page in
Informatica Intelligent Cloud Services
.
  1. Log in to the Azure portal.
  2. In the
    Search
    box, enter
    Key Vault
    .
  3. From the results list, select
    Key Vault
    .
  4. Select the key vault you created in Step 1. Create a key vault.
  5. In the left panel, select
    Access Policies
    .
  6. Click
    Create
    to create a new access policy for the Informatica KMS Connect app.
  7. Grant the following permissions:

      Get

      List

      Decrypt

      Encrypt

      Unwrap Key

      Wrap Key

  8. Under
    Principal
    , search for
    Informatica KMS Connect
    and select it.
  9. Click
    Next
    .
  10. Review and create the access policy.
  11. Log in to
    Informatica Intelligent Cloud Services
    Administrator
    with a user account that has both the Admin and Key Admin roles.
  12. Open the
    Settings
    page and click the
    Security
    tab.
  13. Click the edit (pencil) icon.
  14. In
    Step 2. Configure Managed Key
    , enter the
    Key Vault URI
    ,
    Key Name
    , and
    Key Version
    :
  15. Click
    Test Managed Key
    to test the key.
    A success message appears if the test was successful.
  16. Click the save (checkmark) icon to save your changes.
    It can take up to 24 hours for the key to become active.

Back to Top

0 COMMENTS

We’d like to hear from you!