Skip to content

Commit 0c9a1f4

Browse files
committed
fix errors
1 parent 04dc7f1 commit 0c9a1f4

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/sql-database/transparent-data-encryption-azure-sql.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Microsoft also seamlessly moves and manages the keys as needed for geo-replicati
3737

3838
## Customer-managed transparent data encryption - Bring Your Own Key
3939

40-
Customer-managed TDE is also referred to as Bring Your Own Key (BYOK) support for TDE. In this scenario, the TDE Protector that encrypts the DEK is a customer-managed asymmetric key, which is stored in a customer-owned and managed Azure Key Vault (Azure's cloud-based external key management system) and never leaves the key vault. The TDE Protector can be [generated by the key vault or transferred to the key vault](https://docs.microsoft.com/en-us/azure/key-vault/key-vault-hsm-protected-keys) from an on premises hardware security module (HSM) device. SQL Database needs to be granted permissions to the customer-owned key vault to decrypt and encrypt the DEK. If permissions of the logical SQL server to the key vault are revoked, a database will be inaccessible, and all data is encrypted
40+
Customer-managed TDE is also referred to as Bring Your Own Key (BYOK) support for TDE. In this scenario, the TDE Protector that encrypts the DEK is a customer-managed asymmetric key, which is stored in a customer-owned and managed Azure Key Vault (Azure's cloud-based external key management system) and never leaves the key vault. The TDE Protector can be [generated by the key vault or transferred to the key vault](https://docs.microsoft.com/azure/key-vault/key-vault-hsm-protected-keys) from an on premises hardware security module (HSM) device. SQL Database needs to be granted permissions to the customer-owned key vault to decrypt and encrypt the DEK. If permissions of the logical SQL server to the key vault are revoked, a database will be inaccessible, and all data is encrypted
4141

4242
With TDE with Azure Key Vault integration, users can control key management tasks including key rotations, key vault permissions, key backups, and enable auditing/reporting on all TDE protectors using Azure Key Vault functionality. Key Vault provides central key management, leverages tightly monitored HSMs, and enables separation of duties between management of keys and data to help meet compliance with security policies.
4343
To learn more about BYOK for Azure SQL Database and Azure Synapse, see [Transparent data encryption with Azure Key Vault integration](transparent-data-encryption-byok-azure-sql.md).
@@ -73,7 +73,7 @@ To configure TDE through the Azure portal, you must be connected as the Azure Ow
7373

7474
You turn TDE on and off on the database level. To enable TDE on a database, go to the [Azure portal](https://portal.azure.com) and sign in with your Azure Administrator or Contributor account. Find the TDE settings under your user database. By default, service-managed transparent data encryption is used. A TDE certificate is automatically generated for the server that contains the database. For Azure SQL Managed Instance use T-SQL to turn TDE on and off on a database.
7575

76-
![Service-managed transparent data encryption](./media/transparent-data-encryption-azure-sql/service-managed-tde.png)
76+
![Service-managed transparent data encryption](./media/transparent-data-encryption-azure-sql/service-managed-transparent-data-encryption.png)
7777

7878
You set the TDE master key, known as the TDE protector, on the server level. To use TDE with BYOK support and protect your databases with a key from Key Vault, open the TDE settings under your server.
7979

0 commit comments

Comments
 (0)