< Back

Convert-AadrmKeyToKeyVault

Fri Jan 10, 2020 6:08 pm

NAME Convert-AadrmKeyToKeyVault



SYNOPSIS

Changes the location of a legacy customer-managed key in Azure Rights Management with the location of a

customer-managed key in Azure Key Vault.





SYNTAX

Convert-AadrmKeyToKeyVault [-Force] -KeyIdentifier <String> -KeyVaultKeyUrl <String> [-Confirm] [-WhatIf]

[<CommonParameters>]





DESCRIPTION

The Convert-AadrmKeyToKeyVault cmdlet is only for customers who have previously created a customer-managed key for

the Azure Rights Management service and have received an invitation from Microsoft to migrate their Azure Rights

Management tenant key to Azure Key Vault.



Important: Do not run this cmdlet if you have not received this invitation from Microsoft and do not run this

cmdlet without assistance from Microsoft.



You must use PowerShell to configure your tenant key; you cannot do this configuration by using a management

portal.



Azure RMS now uses Azure Key Vault to manage and monitor a customer-managed Azure RMS tenant key. To create a

customer-managed Azure RMS tenant key for the first time, run Use-AadrmKeyVaultKey instead of this cmdlet.



For more information about how to manage your Azure RMS tenant key, see Planning and implementing your Azure

Information Protection tenant key

(https://docs.microsoft.com/information- ... tenant-key).



Before you run this cmdlet, you will need to identify your original customer-managed Azure RMS tenant key. To do

that, use the Get-AadrmKeys cmdlet. From the output and identified key, you will need the KeyIdentifier value for

the KeyIdentifier parameter when you run this cmdlet.



Also, your organization's administrator for Azure Key Vault must create a new key for Azure RMS and supply you

with a URL for this key. You will need to specify the URL for the KeyVaultKeyUrl parameter when you run this

cmdlet. This Azure Key Vault administrator must also grant Azure RMS access to the key vault that contains the key.



For security reasons, this cmdlet does not let you change the access control for the key; this must be done from

Key Vault.





PARAMETERS

-Force [<SwitchParameter>]

Forces the command to run without asking for user confirmation.



Required? false

Position? named

Default value False

Accept pipeline input? False

Accept wildcard characters? false



-KeyIdentifier <String>

Specifies the key identifier value of the original customer-managed Azure RMS tenant key that you now want to

manage from Azure Key Vault.



To get the key identifier value, use the Get-AadrmKeys cmdlet.



Required? true

Position? named

Default value None

Accept pipeline input? True (ByPropertyName, ByValue)

Accept wildcard characters? false



-KeyVaultKeyUrl <String>

Specifies the URL of the key in Azure Key Vault that you want to use for the Azure RMS tenant key. This key

will be used in Azure RMS as the root key for all cryptographic operations for your Azure RMS tenant.



Required? true

Position? named

Default value None

Accept pipeline input? True (ByPropertyName, ByValue)

Accept wildcard characters? false



-Confirm [<SwitchParameter>]

Prompts you for confirmation before running the cmdlet.



Required? false

Position? named

Default value False

Accept pipeline input? False

Accept wildcard characters? false



-WhatIf [<SwitchParameter>]

Shows what would happen if the cmdlet runs. The cmdlet is not run.



Required? false

Position? named

Default value False

Accept pipeline input? False

Accept wildcard characters? false



<CommonParameters>

This cmdlet supports the common parameters: Verbose, Debug,

ErrorAction, ErrorVariable, WarningAction, WarningVariable,

OutBuffer, PipelineVariable, and OutVariable. For more information, see

about_CommonParameters (https:/go.microsoft.com/fwlink/?LinkID=113216).



INPUTS



OUTPUTS



NOTES









Example 1: Change the location of a legacy Azure RMS tenant key with a key in Azure Key Vault



PS C:\\>Convert-AadrmKeyToKeyVault -KeyIdentifier aaaaaaaa-1111-2222-3333-bbbbbbbbbbbb -KeyVaultKeyUrl

"https://contoso.vault.azure.net/keys/co ... 1122223333"



Changes the location of the original customer-managed key in Azure RMS that has the key identifier of

aaaaaaaa-1111-2222-3333-bbbbbbbbbbbb with the location of a customer-managed key in Azure Key Vault, which is

named contoso-rms-key and has the version number aaaabbbbcccc111122223333 in the Contoso key vault.



RELATED LINKS

Online Version: https://go.microsoft.com/fwlink/?LinkId=799850

Get-AadrmKeys

Use-AadrmKeyVaultKey

Planning and implementing your Azure Information Protection tenant key

https://docs.microsoft.com/information- ... tenant-key