Pre-Configuration: Setting Up Azure Key Vault for Polaris Pro
Optional Key Vault Configuration for Polaris Pro Features
Polaris supports optional Key Vault integration. By default, it uses TEE-isolated ephemeral private key, generating a 4096-bit RSA key pair that remains within the Trusted Execution Environment (TEE). Configuring an encryption key in Azure Key Vault enables Polaris Pro behavior, allowing persistent encrypted storage across disks, cloud storage, and databases with key-based access control.
Before deploying Polaris Pro, you need to configure Azure Key Vault to store and manage cryptographic keys securely. This guide outlines the necessary steps to:
- Create an Azure Key Vault with a Confidential Release Policy.
- Define and apply a Confidential Operation Policy.
- Create a cryptographic key within the Key Vault.
- Grant access to the AKS Managed Identity.
1. Create an Azure Key Vault
Azure Key Vault securely stores cryptographic keys required for confidential computing in Polaris Pro.
Command to Create a Key Vault
az keyvault create --name "<KEYVAULT_NAME>" --resource-group "<RESOURCE_GROUP>" --location "<LOCATION>" --sku premium
Key Vault Parameters
Below are the parameters required for Azure Key Vault configuration in Polaris Pro:
<KEYVAULT_NAME>
: The name of the Azure Key Vault.<RESOURCE_GROUP>
: The Azure Resource Group where the Key Vault will be deployed.<LOCATION>
: The Azure region where the Key Vault will be created.- Premium SKU: Enables HSM-protected keys and confidential policies for secure key management.
2. Define and Apply a Confidential Operation Policy
Polaris Pro requires a Confidential Operation Policy to restrict key usage to a Confidential VM (CVM) or Trusted Execution Environment (TEE).
Confidential Policy JSON (cvm-release-policy.json
)
This JSON policy ensures that key operations are restricted to a Confidential Computing environment.
{
"version": "1.0.0",
"anyOf": [
{
"authority": "https://sharedweu.weu.attest.azure.net",
"allOf": [
{
"claim": "x-ms-isolation-tee.x-ms-attestation-type",
"equals": "sevsnpvm"
},
{
"claim": "x-ms-isolation-tee.x-ms-compliance-status",
"equals": "azure-compliant-cvm"
}
]
}
]
}
Policy Breakdown
Below are the key attributes of the Confidential Operation Policy and their descriptions:
x-ms-isolation-tee.x-ms-attestation-type
: Ensures that the cryptographic key is used only within a Confidential VM (SEV-SNP).x-ms-isolation-tee.x-ms-compliance-status
: Confirms that the execution environment is an Azure-compliant Confidential Virtual Machine (CVM).
3. Create a Cryptographic Key in the Key Vault
A HSM-protected RSA key is generated in Azure Key Vault with the Confidential Policy applied.
Command to Create the Key
az keyvault key create --exportable true --vault-name "<KEYVAULT_NAME>" --kty RSA-HSM --name "<KEY_NAME>" --policy ./cvm-release-policy.json
Explanation
<KEYVAULT_NAME>
: The Azure Key Vault name where the cryptographic key will be created.<KEY_NAME>
: The name of the cryptographic key that will be stored in the Key Vault.- RSA-HSM: Uses Hardware Security Module (HSM) protection, ensuring that the key remains secure.
- Confidential Policy: Restricts key operations to a Confidential Virtual Machine (CVM) or Trusted Execution Environment (TEE), preventing unauthorized access.
4. Grant Access to the AKS Managed Identity
Polaris Pro runs on Azure Kubernetes Service (AKS), and its managed identity must be granted access to the Key Vault to perform key release.
Retrieve the AKS Managed Identity Client ID
AKS_MI_ID=$(az aks show \
--resource-group "<RESOURCE_GROUP>" \
--name "<AKS_CLUSTER_NAME>" \
--query "identityProfile.kubeletidentity.clientId" \
--output tsv)
Grant Key Permissions
Once the AKS Managed Identity Client ID is retrieved, grant it the necessary key permissions in Azure Key Vault by running the following command:
az keyvault set-policy \
--name "<KEYVAULT_NAME>" \
--object-id $AKS_MI_ID \
--key-permissions get release \
--output none
Explanation
<KEYVAULT_NAME>
: The Azure Key Vault name where the cryptographic key is stored.<RESOURCE_GROUP>
: The Azure Resource Group containing the AKS cluster.<AKS_CLUSTER_NAME>
: The name of the Azure Kubernetes Service (AKS) cluster where Polaris Pro is deployed.- Policy Grants: Provides the AKS agentpool’s managed identity with the following permissions:
get
: Allows retrieving key details.release
: Enables key release operations within a Confidential VM (CVM).