Skip to content

Commit 0381ab6

Browse files
committed
undo key change
1 parent aa34a76 commit 0381ab6

File tree

1 file changed

+1
-3
lines changed

1 file changed

+1
-3
lines changed

articles/storage/common/storage-service-encryption.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: storage
55
author: tamram
66

77
ms.service: storage
8-
ms.date: 03/04/2020
8+
ms.date: 02/05/2020
99
ms.topic: conceptual
1010
ms.author: tamram
1111
ms.reviewer: cbrooks
@@ -110,8 +110,6 @@ Rotating the key does not trigger re-encryption of data in the storage account.
110110

111111
To revoke access to customer-managed keys, use PowerShell or Azure CLI. For more information, see [Azure Key Vault PowerShell](/powershell/module/az.keyvault//) or [Azure Key Vault CLI](/cli/azure/keyvault). Revoking access effectively blocks access to all data in the storage account, as the encryption key is inaccessible by Azure Storage.
112112

113-
When you revoke access to customer-managed keys
114-
115113
### Customer-managed keys for Azure managed disks (preview)
116114

117115
Customer-managed keys are also available for managing encryption of Azure managed disks (preview). Customer-managed keys behave differently for managed disks than for Azure Storage resources. For more information, see [Server side encryption of Azure managed disks](../../virtual-machines/windows/disk-encryption.md) for Windows or [Server side encryption of Azure managed disks](../../virtual-machines/linux/disk-encryption.md) for Linux.

0 commit comments

Comments
 (0)