-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Request] Support for Azure Managed HSM Vaults #134
Comments
Hi @tollercode, do you know if this service is available in different clouds? I cannot find information about that, see |
Hi @tollercode, I added some support in this PR smallstep/crypto#427 I'm going with managedhsm=true, as it looks like dedicated HSM uses Thales' own SDK or a PKCS#11 module. One thing that I'm not currently enforcing is the use of the HSM key types when a new key is created (azkeys.JSONWebKeyTypeECHSM and azkeys.JSONWebKeyTypeRSAHSM). To do this, you will need to add I don't see anything specific to the premium tier, I believe the SDK will work as it is. An easy way to pull go 1.20
use .
use ../crypto |
Hey @maraino, Azure Managed HSM would only support the EC-HSM and RSA-HSM Key types, whereas Premium tier Key Vaults do support both software and HSM backed keys. See https://learn.microsoft.com/en-us/azure/key-vault/general/about-keys-secrets-certificates#object-types or https://learn.microsoft.com/en-us/azure/key-vault/keys/about-keys#hsm-protected-keys Also keen for this to be added in a future release. |
@thecmdradama, Do you have the ability to test the changes in my PR? The main reason it wasn't merged is that I wasn't able to test it. |
Hi @maraino, not easily with just those changes unfortunately. If I could get a test docker image of step-ca, I can run up a Managed HSM in my own lab environment to validate. |
@thecmdradama Would a docker image of |
@maraino Unfortunately I don't think it will. I believe that I would then have to compile my own step-ca container image using the test/dev kms plugin container |
Azure also offers Managed HSM that are FIPS 140-2 lvl 3 compliant.
These instances follow the AKV API (no secret & cert support)
It would be nice to have the option to also use managed.
Managed HSM should support the action: getKey & signKey
The only difference is, that they use a different default endpoint:
<your-HSM-name>.managedhsm.azure.net
Maybe that could be supported by setting a new optional flag within the uri parameter. E.g. managedhsm=true, or hsm=premium|managed|dedicated
premium = Current behavior using Premium AKV
managed = using Azure Managed HSM
dedicated = future implementation to support dedicated Azure HSM instances
See for a comparison of different AKV SKU
The text was updated successfully, but these errors were encountered: