Configure the Azure Key Vault Integration feature on any existing Azure Virtual machine with SQL Server Enterprise edition.
This template can be used for any Azure virtual machine running SQL Server 2012 or newer, Enterprise edition.
All resources used in this template must be ARM resources.
The Azure Key Vault integration feature will configure your virtual machine to be able to connect to your Azure key vault. It achieves this by installing the latest version of the SQL Server Connector, configuring EKM provider to access Azure Key Vault, and creates the credential to allow you to access your vault. More information on this feature can be found here.
This template can be used to enable or change the configuration of Azure Key Vault Integration.
If you wish to disable this feature, you must edit azuredeploy.json and change "Enable" to be false.
Name | Description | Example |
---|---|---|
sqlAkvCredentialName | Specify the name of the credential that this feature will create within SQL Server, allowing the VM to have access to the key vault. | mycred1 |
sqlAkvUrl | The URL for your key vault | https://contosokeyvault.vault.azure.net/ |
servicePrincipalName | Azure Active Directory service principal name. This is also referred to as the Client ID. | fde2b411-33d5-4e11-af04eb07b669ccf2 |
servicePrincipalSecret | Azure Active Directory service principal secret. This is also referred to as the Client Secret. | 9VTJSQwzlFepD8XODnzy8n2V01Jd8dAjwm/azF1XDKM= |
Automated Patching is supported in your virtual machine through the SQL Server IaaS Agent extension. This extension must be installed on the VM to be able to use this feature. When you enable Automated Patching on your virtual machine, the extension will be automatically installed. This extension will also report back the latest status of this feature to you. More information on this extension can be found here.