docs/content/v2.20/yugabyte-platform/security/create-kms-config/azure-kms.md
Encryption at rest uses a master key to encrypt and decrypt universe keys. The master key details are stored in YugabyteDB Anywhere in key management service (KMS) configurations. You enable encryption at rest for a universe by assigning the universe a KMS configuration. The master key designated in the configuration is then used for generating the universe keys used for encrypting the universe data.
<ul class="nav nav-tabs-alt nav-tabs-yb"> <li > <a href="../aws-kms/" class="nav-link"> <i class="fa-brands fa-aws" aria-hidden="true"></i> AWS KMS </a> </li> <li > <a href="../google-kms/" class="nav-link"> <i class="fa-brands fa-google" aria-hidden="true"></i> Google KMS </a> </li> <li > <a href="../azure-kms/" class="nav-link active"> <i class="icon-azure" aria-hidden="true"></i> Azure Key Vault </a> </li> <li > <a href="../hashicorp-kms/" class="nav-link"> <i class="icon-postgres" aria-hidden="true"></i> HashiCorp Vault </a> </li> </ul>Encryption at rest in YugabyteDB Anywhere supports the use of Microsoft Azure Key Vault.
Conceptually, Azure Key Vault consists of a key vault containing one or more keys, with each key capable of having multiple versions.
Before defining a KMS configuration with YugabyteDB Anywhere, you need to create a key vault through the Azure portal. The following settings are required:
If you are planning to use an existing cryptographic key with the same name, it must meet the following criteria:
Note that YugabyteDB Anywhere does not manage the key vault and deleting the KMS configuration does not delete the key vault, master key, or key versions on Azure Key Vault.
You can create a KMS configuration that uses Azure Key Vault, as follows:
Navigate to Configs > Security > Encryption At Rest to access the list of existing configurations.
Click Create New Config.
Enter the following configuration details in the form:
Click Save.
Your new configuration should appear in the list of configurations. A saved KMS configuration can only be deleted if it is not in use by any existing universes.
Optionally, to confirm that the information is correct, click Show details. Note that sensitive configuration values are displayed partially masked.
You can modify an existing KMS configuration as follows:
Navigate to Configs > Security > Encryption At Rest to open a list of existing configurations.
Find the configuration you want to modify and click its corresponding Actions > Edit Configuration.
Provide new values for the Vault Address and Secret Token fields.
Click Save.
Optionally, to confirm that the information is correct, click Show details or Actions > Details.
{{<note title="Note">}} You can only delete a KMS configuration if it has never been used by any universes. {{</note>}}
To delete a KMS configuration, click its corresponding Actions > Delete Configuration.