Step 1: Create Your Azure Key Vault and Key
Create a new Azure Key Vault and encryption key for Laurel:
Log in to the Azure Portal.
Navigate to Key Vaults (search for "Key Vaults" in the top search bar).
Click + Create to create a new Key Vault.
Configure the Key Vault settings:
Subscription: Select your Azure subscription
Resource Group: Choose an existing resource group or create a new one
Key Vault Name: Enter a unique name (e.g., laurel-byok-vault)
Region: Choose the region closest to your data
Pricing Tier: Standard is sufficient for BYOK
Click Review + Create, then Create.

Once the Key Vault is created, navigate to it and click on Keys in the left sidebar.
Click + Generate/Import to create a new key.
Configure the key settings:
Options: Select Generate
Name: Enter a descriptive name (e.g., laurel-encryption-key)
Key Type: Select RSA
RSA Key Size: Select 4096 (recommended)
Enabled: Yes
Click Create.

Copy the Key Vault Endpoint and Key Name:
Key Vault Endpoint: Found at the top of your Key Vault overview page. It will look like: https://laurel-byok-vault.vault.azure.net/
Key Name: The name you gave your key (e.g., laurel-encryption-key)
Key Version: Looks like a GUID string (e.g.,
ef456dd3-6929-4aca-87bf-4733b91db1cd)
Step 2: Create a Service Principal for Laurel
Laurel requires a Service Principal (application identity) to access your Key Vault. You'll create this and share the credentials with Laurel.
In the Azure Portal, navigate to Azure Active Directory (or Microsoft Entra ID).
Click on App registrations in the left sidebar.
Click + New registration.
Configure the application:
Name: Enter a descriptive name (e.g., Laurel-BYOK-ServicePrincipal)
Supported account types: Select Accounts in this organizational directory only
Redirect URI: Leave blank
Click Register.
Copy the following values (you'll need these for Laurel configuration):
Application (client) ID: Found on the Overview page
Directory (tenant) ID: Found on the Overview page
Create a client secret:
Click on Certificates & secrets in the left sidebar
Click + New client secret
Description: Enter a description (e.g., Laurel BYOK Access)
Expires: Choose an expiration period of 2 years
Click Add
IMPORTANT: Copy the secret VALUE immediately - it will only be shown once. Store it securely.
Copy your Subscription ID:
Navigate to Subscriptions in the Azure Portal
Find the subscription containing your Key Vault
Copy the Subscription ID
Step 3: Configure Key Vault Access Policies
Grant the Service Principal permission to use your encryption key.
Using Access Policies
Navigate to your Key Vault in the Azure Portal.
Click on Access policies in the left sidebar.
Click + Create (or + Add Access Policy in older portal versions).
Configure the permissions:
Click Next (or the Select principal section).
Search for and select the Service Principal you created in Step 2 (e.g., Laurel-BYOK-ServicePrincipal).
Click Select, then Next, then Create (or Add).
Important: Click Save at the top to apply the changes.
NOTE: Under Access Configuration for the key vault, you may need to update to "Vault Access Policy"
Step 4: Configure Laurel
Log in to Laurel.
Navigate to the Security Settings tab in Laurel Admin (you need to be a super customer admin to access this).
Select Azure as your encryption provider.
Enter the following information:
Tenant ID: Paste the Directory (tenant) ID from Step 2
Subscription ID: Paste your Azure Subscription ID from Step 2
Key Vault Endpoint: Paste the Key Vault URL (e.g., https://laurel-byok-vault.vault.azure.net/)
Key Name: Enter your key name (e.g., laurel-encryption-key)
Key Version: Enter the GUID version (e.g.
ef456dd3-6929-4aca-87bf-4733b91db1cd)Client ID: Paste the Application (client) ID from Step 2
Client Secret: Paste the client secret VALUE you saved from Step 2
Save the settings.
A Laurel administrator must validate and enable the feature for it to become active. Submit a support ticket and we'll validate the configuration and enable the feature!


