There are several ways to export Fortanix Data Security Manager (DSM) keys to major cloud providers that support BYOK for server-side encryption.
Download Fortanix DSM CLI from here.
3.1 Azure App Configuration
You will need to provide the tool your Azure credentials, which will be used to authenticate to Azure and perform interactions with Azure Key Vault. You can do the following to get these credentials:
- Log in to https://portal.azure.com/.
- Register an application. Figure 1: Initiate app registration Figure 2: Register an App Figure 3: App registered
- Create a client secret for the above application. Figure 4: Client secret for the app
- Give the App permission to access the Azure Key Vault. Figure 5: Key Vault permission to access app
- Create an Azure Key Vault. Figure 6: Create Azure Key Vault
Figure 7: Create Azure Key Vault
- Add the application in the Access Policy of the Key Vault. Figure 8: Add access policy Figure 9: Access policy added
3.2 Fortanix Data Security Manager Configuration
- Log in to Fortanix DSM ( https://sdkms.fortanix.com/ ).
- Create an account in Fortanix DSM.
- Create a group in Fortanix DSM account.
- Create an app in Fortanix DSM.
Refer to the Fortanix Getting Started Guide for instructions on how to do the Steps 1-4 above.
Make sure that the app you are going to use, has access to the group where the DSM key exists that you want to use for this BYOK operation.
4.0 Fortanix Data Security Manager with Azure Key Vault - Using Azure Key Vault Plugin
- Go to the Fortanix DSM home page and click the Plugins icon. Figure 13: Plugins
- In the Plugins page, click the PLUGIN LIBRARY tab and then click the Self-Defending KMS-Azure Bring Your Own Key (BYOK) tile to load the associated plugin page with detailed information about the plugin, common use cases, setup, and format of the plugin inputs and outputs. Figure 14: Plugin Library
- In the "Self-Defending KMS-Azure Bring Your Own Key (BYOK) plugin" page, to install a plugin the user needs to click the GET PLUGIN button to go to the plugin creation page. Figure 15: Get Plugin
- Review the plugin name and assign it to a group, and then click Save. Figure 16: Review plugin details
- Now go to the detailed view of the plugin, where you can also test the plugin's request and response using the Test Plugin text box where you can paste a sample request from the plugin code and see the response in the Test output section. To configure and run the plugin click the INVOKE PLUGIN button. Figure 17: Invoke Plugin
Tenant_idis “Directory ID of Vault”.
Client_secretare defined in Step 3 in Section 3.1.
For more details on how to use the Plugin Library, see the article https://support.fortanix.com/hc/en-us/articles/360041950371-User-s-Guide-Plugin-Library