Setting up a Storage Bucket
- Sign in to Microsoft Azure Home.
- Open the Portal menu, using the Hamburger menu icon.
- Select Storage Accounts.
- On the Storage Accounts screen, select Create
- On the Basic tab, enter the following information:
- Subscription - Select the subscription for the new storage account.
- Resource Group - Create a new resource group for this storage account, or select an existing one
- Storage Account Name - Choose a unique name for the storage account. Storage account names must be between 3 and 24 characters in length and may contain numbers and lowercase letters only.
- Region - Select the appropriate region for the storage account.
- On the Advanced tab, set Access Tiers to either HOT or COOL, as required.
- On the Data Protection tab, to configure data protection options for blob data in your new storage account. These options can also be configured after the storage account is created.
- In CloudM Archive, the data retention rules can be rewritten using the Data Retention policies.
- Once configured these settings, select Review + Create, and then select Create again.
- The Storage Account will be created. This process can take a couple of minutes to complete.
- Navigate back to the Storage Accounts screen.
- Click on the name of the newly created account in the list of Storage Accounts.
- In the menu, scroll down and select Blob Services > Containers.
- Now, select the + Container button,
- In the pop up screen, enter:
- Name - A unique name for the container
- Public Access Level - Set to Private
- Advanced Settings > Encryption Scope - Leave as default.
- Click on Create.
- On the same Storage Account page, select the Settings > Access Keys menu option.
- In the Access Keys page, click on the name of the newly created key and then click again on the current version.
- Select the Show Keys button at the top of the screen.
- Copy the value in the Key 1 > Key field. Enter this value later so you should copy into a document or notepad application.
Setup Azure Key Value
- In the Search bar at the top of the screen, enter Key Vaults and select the Key Vaults option.
- On the Key Vaults screen, select Create.
- Under the Basics tab, enter the Subscription, Resource Group and Name.
- Select Create + Review, and then select Create again,
- When the Key Vault is being created, you will be taken away from the Key Vaults section so navigate back to Key Vaults using the Search bar.
- On the Key Vaults screen, select the newly created Key Vault.
- Select Keys.
- Select Generate.
- Click on the newly created key, copy the key identifier without the version info at the end. This is the value for the CloudM Migrate Key Vault URL setting.
- Navigate to Azure Active Directory -> App Registrations, and select New registration.
- Fill out the details and select Register.
- On the App Registration screen, click on the name of the newly registered application.
- Select API permissions from the menu on the left side of the screen.
- Select Add a permission and add either of the following:
- User Read
- user_impersonation
- In the menu on the left, select the Certificates & Secrets option.
- Select New client secret and copy the Secret ID. This is the value for the CloudM Migrate Azure key vault client secret setting.
- In the left side menu, select Overview, and copy the Application (client) ID for the CloudM Migrate Azure key vault client ID setting.
- Return to Home > Key Vault,
- Ensure that the Permission Model is set to Vault access policy,
- Select + Add Access Policy,
- On the Add access policy screen, make sure that the Select principal value is set to the required Application (as set in step 4 and 5),
- Ensure that the Key Permissions field is set to Get, Decrypt, Encrypt and Unwrap Key.
- Select Add.