Skip to content

Commit 254bcf8

Browse files
committed
note
1 parent 0ceb10e commit 254bcf8

File tree

2 files changed

+5
-3
lines changed

2 files changed

+5
-3
lines changed

articles/ai-studio/concepts/encryption-keys-portal.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,8 @@ The following data is stored on the managed resources.
5050
A new architecture for customer-managed key encryption with hubs is available in preview, which resolves the dependency on the managed resource group. In this new model, encrypted data is stored service-side on Microsoft-managed resources instead of in managed resources in your subscription. Metadata is stored in multitenant resources using document-level CMK encryption. An Azure AI Search instance is hosted on the Microsoft-side per customer, and for each hub. Due to its dedicated resource model, its Azure cost is charged in your subscription via the hub resource.
5151

5252
> [!NOTE]
53-
> During this preview key rotation and user-assigned identity capabilities are not supported. Service-side encryption is currently not supported in reference to an Azure Key Vault for storing your encryption key that has public network access disabled.
53+
> - During this preview key rotation and user-assigned identity capabilities are not supported. Service-side encryption is currently not supported in reference to an Azure Key Vault for storing your encryption key that has public network access disabled.
54+
> - If you are using the preview server-side storage, Azure charges will continue to accrue during the soft delete retention period.
5455
5556
## Use customer-managed keys with Azure Key Vault
5657

@@ -97,7 +98,7 @@ Alternatively, use infrastructure-as-code options for automation. Example Bicep
9798
* At the time of creation, you can't provide or modify resources that are created in the Microsoft-managed Azure resource group in your subscription.
9899
* You can't delete Microsoft-managed resources used for customer-managed keys without also deleting your hub.
99100
* [Azure AI services Customer-Managed Key Request Form](https://aka.ms/cogsvc-cmk) is still required for Speech and Content Moderator.
100-
* If you are using the [server-side preview](#preview-service-side-storage-of-encrypted-data-when-using-customer-managed-keys)charges will continue to accrue during the soft delete retention period.
101+
* If you are using the [server-side preview](#preview-service-side-storage-of-encrypted-data-when-using-customer-managed-keys), Azure charges will continue to accrue during the soft delete retention period.
101102

102103
## Related content
103104

articles/machine-learning/concept-customer-managed-keys.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,8 @@ To opt in for this preview, set the `enableServiceSideCMKEncryption` on a REST A
124124
:::image type="content" source="./media/concept-customer-managed-keys/cmk-service-side-encryption.png" alt-text="Screenshot of the encryption tab with the option for server side encryption selected." lightbox="./media/concept-customer-managed-keys/cmk-service-side-encryption.png":::
125125

126126
> [!NOTE]
127-
> During this preview key rotation and data labeling capabilities are not supported. Server-side encryption is currently not supported in reference to an Azure Key Vault for storing your encryption key that has public network access disabled.
127+
> - During this preview key rotation and data labeling capabilities are not supported. Server-side encryption is currently not supported in reference to an Azure Key Vault for storing your encryption key that has public network access disabled.
128+
> - If you are using the preview server-side storage, Azure charges will continue to accrue during the soft delete retention period.
128129
129130
For templates that create a workspace with service-side encryption of metadata, see
130131

0 commit comments

Comments
 (0)