Skip to content

Commit 0d11bdc

Browse files
committed
Adding managed.
1 parent f166517 commit 0d11bdc

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

includes/virtual-machines-managed-disks-customer-managed-keys-restrictions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@
1414
- [HSM](../articles/key-vault/keys/hsm-protected-keys.md) keys require the **premium** tier of Azure Key vaults.
1515
- For Ultra Disks and Premium SSD v2 disks only:
1616
- Snapshots created from disks that are encrypted with server-side encryption and customer-managed keys must be encrypted with the same customer-managed keys.
17-
- User-assigned identities aren't supported for Ultra Disks and Premium SSD v2 disks encrypted with customer-managed keys.
17+
- User-assigned managed identities aren't supported for Ultra Disks and Premium SSD v2 disks encrypted with customer-managed keys.
1818
- Most resources related to your customer-managed keys (disk encryption sets, VMs, disks, and snapshots) must be in the same subscription and region.
1919
- Azure Key Vaults may be used from a different subscription but must be in the same region as your disk encryption set. As a preview, you can use Azure Key Vaults from [different Microsoft Entra tenants](../articles/virtual-machines/disks-cross-tenant-customer-managed-keys.md).
2020
- Disks encrypted with customer-managed keys can only move to another resource group if the VM they are attached to is deallocated.

0 commit comments

Comments
 (0)