Skip to content

Commit 0e7b7c2

Browse files
authored
addressing tom's wonderful feedback
1 parent 93fe911 commit 0e7b7c2

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/container-instances/container-instances-encrypt-data.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ The rest of the document covers the steps required to encrypt your ACI deploymen
3434

3535
This article reviews two flows for encrypting data with a customer-managed key:
3636
1. Encrypt data with a customer-managed key stored in a standard Azure Key Vault
37-
2. Encrypt data with a customer-managed key stored in a network-proteted Azure Key Vault with [Trusted Services](../key-vault/general/network-security.md) enabled.
37+
2. Encrypt data with a customer-managed key stored in a network-protected Azure Key Vault with [Trusted Services](../key-vault/general/network-security.md) enabled.
3838

3939
## Encrypt data with a customer-managed key stored in a standard Azure Key Vault
4040

@@ -286,7 +286,7 @@ spID=$(az identity show \
286286

287287
### Set access policy
288288

289-
Create a new access policy for allowing the user-assigned identity to access abd unwrap your Key for encryption purposes.
289+
Create a new access policy for allowing the user-assigned identity to access and unwrap your key for encryption purposes.
290290

291291
```azurecli-interactive
292292
az keyvault set-policy \
@@ -316,17 +316,17 @@ az keyvault update \
316316
### Modify your JSON deployment template
317317

318318
> [!IMPORTANT]
319-
> Encrypting deployment data with a customer-managed key is available in the latest API version (2022-09-01) that is currently rolling out. This API version is only available via ARM or REST. If you have any issues with this, please reach out to Azure Support.
319+
> Encrypting deployment data with a customer-managed key is available in the 2022-09-01 API version or newer. The 2022-09-01 API version is only available via ARM or REST. If you have any issues with this, please reach out to Azure Support.
320320
321321
Once the key vault key and access policy are set up, add the following properties to your ACI deployment template. Learn more about deploying ACI resources with a template in the [Tutorial: Deploy a multi-container group using a Resource Manager template](./container-instances-multi-container-group.md).
322322
* Under `resources`, set `apiVersion` to `2022-09-01`.
323323
* Under the container group properties section of the deployment template, add an `encryptionProperties`, which contains the following values:
324-
* `vaultBaseUrl`: the DNS Name of your key vault, can be found on the overview blade of the key vault resource in Portal
324+
* `vaultBaseUrl`: the DNS Name of your key vault. This can be found on the overview blade of the key vault resource in Portal
325325
* `keyName`: the name of the key generated earlier
326326
* `keyVersion`: the current version of the key. This can be found by clicking into the key itself (under "Keys" in the Settings section of your key vault resource)
327327
* `identity`: this is the resource URI of the Managed Identity instance created earlier
328328
* Under the container group properties, add a `sku` property with value `Standard`. The `sku` property is required in API version 2022-09-01.
329-
* Under resources, add the `identity` object required to use Managed Identity with ACI, whichcontainsthe following values:
329+
* Under resources, add the `identity` object required to use Managed Identity with ACI, which contains the following values:
330330
* `type`: the type of the identity being used (either user-assigned or system-assigned). This case will be set to "UserAssigned"
331331
* `userAssignedIdentities`: the resourceURI of the same user-assigned identity used above in the `encryptionProperties` object.
332332

0 commit comments

Comments
 (0)