Skip to content

Commit 08870b3

Browse files
authored
Merge pull request #96562 from MladjoA/patch-5
Expiration date is now allowed for key
2 parents 4d213a2 + 2f7dd7f commit 08870b3

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/sql-database/transparent-data-encryption-byok-azure-sql.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,13 +10,13 @@ ms.topic: conceptual
1010
author: aliceku
1111
ms.author: aliceku
1212
ms.reviewer: vanto
13-
ms.date: 11/04/2019
13+
ms.date: 11/19/2019
1414
---
1515
# Azure SQL Transparent Data Encryption with customer-managed key
1616

1717
Azure SQL [Transparent Data Encryption (TDE)](https://docs.microsoft.com/sql/relational-databases/security/encryption/transparent-data-encryption) with customer-managed key enables Bring Your Own Key (BYOK) scenario for data protection at rest, and allows organizations to implement separation of duties in the management of keys and data. With customer-managed transparent data encryption, customer is responsible for and in a full control of a key lifecycle management (key creation, upload, rotation, deletion), key usage permissions, and auditing of operations on keys.
1818

19-
In this scenario, the key used for encryption of the Database Encryption Key (DEK), called TDE protector, is a customer-managed asymmetric key stored in a customer-owned and customer-managed [Azure Key Vault (AKV)](https://docs.microsoft.com/azure/key-vault/key-vault-secure-your-key-vault), a cloud-based external key management system. Key Vault is highly available and scalable secure storage for RSA cryptographic keys, backed by FIPS 140-2 Level 2 validated hardware security modules (HSMs). It doesn't allow direct access to a stored key, but provides services of encryption/decryption using the key to the authorized entities. The key can be generated by the key vault, imported, or [transferred to the key vault from an on-prem HSM device](https://docs.microsoft.com/azure/key-vault/key-vault-hsm-protected-keys).
19+
In this scenario, the key used for encryption of the Database Encryption Key (DEK), called TDE protector, is a customer-managed asymmetric key stored in a customer-owned and customer-managed [Azure Key Vault (AKV)](https://docs.microsoft.com/azure/key-vault/key-vault-secure-your-key-vault), a cloud-based external key management system. Key Vault is highly available and scalable secure storage for RSA cryptographic keys, optionally backed by FIPS 140-2 Level 2 validated hardware security modules (HSMs). It doesn't allow direct access to a stored key, but provides services of encryption/decryption using the key to the authorized entities. The key can be generated by the key vault, imported, or [transferred to the key vault from an on-prem HSM device](https://docs.microsoft.com/azure/key-vault/key-vault-hsm-protected-keys).
2020

2121
For Azure SQL Database and Azure SQL Data Warehouse, the TDE protector is set at the logical server level and is inherited by all encrypted databases associated with that server. For Azure SQL Managed Instance, the TDE protector is set at the instance level and is inherited by all encrypted databases on that instance. The term *server* refers both to SQL Database logical server and managed instance throughout this document, unless stated differently.
2222

@@ -76,9 +76,9 @@ Auditors can use Azure Monitor to review key vault AuditEvent logs, if logging i
7676

7777
- TDE protector can be only asymmetric, RSA 2048 or RSA HSM 2048 key.
7878

79-
- The key cannot have activation or expiration date set.
79+
- The key activation date (if set) must be a date and time in the past. Expiration date (if set) must be a future date and time.
8080

81-
- The key must be in the Enabled state in the key vault.
81+
- The key must be in the *Enabled* state.
8282

8383
- If you are importing existing key into the key vault, make sure to provide it in the supported file formats (.pfx, .byok, or .backup).
8484

0 commit comments

Comments
 (0)