Skip to content

Commit 13e84e3

Browse files
committed
branding
1 parent 0710378 commit 13e84e3

File tree

2 files changed

+16
-16
lines changed

2 files changed

+16
-16
lines changed

articles/mysql/concepts-data-encryption-mysql.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -46,21 +46,21 @@ The DEKs, encrypted with the KEKs, are stored separately. Only an entity with ac
4646

4747
For a MySQL server to use customer-managed keys stored in Key Vault for encryption of the DEK, a Key Vault administrator gives the following access rights to the server:
4848

49-
* **get**: For retrieving the public part and properties of the key in the Key Vault.
49+
* **get**: For retrieving the public part and properties of the key in the key vault.
5050
* **wrapKey**: To be able to encrypt the DEK.
5151
* **unwrapKey**: To be able to decrypt the DEK.
5252

53-
The Key Vault administrator can also [enable logging of Key Vault audit events](../azure-monitor/insights/azure-key-vault.md), so they can be audited later.
53+
The key vault administrator can also [enable logging of Key Vault audit events](../azure-monitor/insights/azure-key-vault.md), so they can be audited later.
5454

55-
When the server is configured to use the customer-managed key stored in the Key Vault, the server sends the DEK to the Key Vault for encryptions. Key Vault returns the encrypted DEK, which is stored in the user database. Similarly, when needed, the server sends the protected DEK to the Key Vault for decryption. Auditors can use Azure Monitor to review Key Vault audit event logs, if logging is enabled.
55+
When the server is configured to use the customer-managed key stored in the key vault, the server sends the DEK to the key vault for encryptions. Key Vault returns the encrypted DEK, which is stored in the user database. Similarly, when needed, the server sends the protected DEK to the key vault for decryption. Auditors can use Azure Monitor to review Key Vault audit event logs, if logging is enabled.
5656

5757
## Requirements for configuring data encryption for Azure Database for MySQL
5858

5959
The following are requirements for configuring Key Vault:
6060

6161
* Key Vault and Azure Database for MySQL must belong to the same Azure Active Directory (Azure AD) tenant. Cross-tenant Key Vault and server interactions aren't supported. Moving resources afterwards requires you to reconfigure the data encryption.
62-
* You must enable the soft-delete feature on the Key Vault, to protect from data loss if an accidental key (or Key Vault) deletion happens. Soft-deleted resources are retained for 90 days, unless the user recovers or purges them in the meantime. The recover and purge actions have their own permissions associated in a Key Vault access policy. The soft-delete feature is off by default, but you can enable it through PowerShell or the Azure CLI (note that you can't enable it through the Azure portal).
63-
* Grant the Azure Database for MySQL access to the Key Vault with the get, wrapKey, and unwrapKey permissions by using its unique managed identity. In the Azure portal, the unique identity is automatically created when data encryption is enabled on the MySQL. See [Configure data encryption for MySQL](howto-data-encryption-portal.md) for detailed, step-by-step instructions when you're using the Azure portal.
62+
* You must enable the soft-delete feature on the key vault, to protect from data loss if an accidental key (or Key Vault) deletion happens. Soft-deleted resources are retained for 90 days, unless the user recovers or purges them in the meantime. The recover and purge actions have their own permissions associated in a Key Vault access policy. The soft-delete feature is off by default, but you can enable it through PowerShell or the Azure CLI (note that you can't enable it through the Azure portal).
63+
* Grant the Azure Database for MySQL access to the key vault with the get, wrapKey, and unwrapKey permissions by using its unique managed identity. In the Azure portal, the unique identity is automatically created when data encryption is enabled on the MySQL. See [Configure data encryption for MySQL](howto-data-encryption-portal.md) for detailed, step-by-step instructions when you're using the Azure portal.
6464

6565
* When you're using a firewall with Key Vault, you must enable the option **Allow trusted Microsoft services to bypass the firewall**.
6666

@@ -69,7 +69,7 @@ The following are requirements for configuring the customer-managed key:
6969
* The customer-managed key to be used for encrypting the DEK can be only asymmetric, RSA 2028.
7070
* The key activation date (if set) must be a date and time in the past. The expiration date (if set) must be a future date and time.
7171
* The key must be in the *Enabled* state.
72-
* If you're importing an existing key into the Key Vault, make sure to provide it in the supported file formats (`.pfx`, `.byok`, `.backup`).
72+
* If you're importing an existing key into the key vault, make sure to provide it in the supported file formats (`.pfx`, `.byok`, `.backup`).
7373

7474
## Recommendations
7575

@@ -94,10 +94,10 @@ When you configure data encryption with a customer-managed key in Key Vault, con
9494

9595
It might happen that someone with sufficient access rights to Key Vault accidentally disables server access to the key by:
9696

97-
* Revoking Key Vault's get, wrapKey, and unwrapKey permissions from the server.
97+
* Revoking the key vault's get, wrapKey, and unwrapKey permissions from the server.
9898
* Deleting the key.
9999
* Deleting the key vault.
100-
* Changing Key Vault's firewall rules.
100+
* Changing the key vault's firewall rules.
101101

102102
* Deleting the managed identity of the server in Azure AD.
103103

articles/postgresql/concepts-data-encryption-postgresql.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -46,21 +46,21 @@ The DEKs, encrypted with the KEKs, are stored separately. Only an entity with ac
4646

4747
For a PostgreSQL server to use customer-managed keys stored in Key Vault for encryption of the DEK, a Key Vault administrator gives the following access rights to the server:
4848

49-
* **get**: For retrieving the public part and properties of the key in the Key Vault.
49+
* **get**: For retrieving the public part and properties of the key in the key vault.
5050
* **wrapKey**: To be able to encrypt the DEK.
5151
* **unwrapKey**: To be able to decrypt the DEK.
5252

53-
The Key Vault administrator can also [enable logging of Key Vault audit events](../azure-monitor/insights/azure-key-vault.md), so they can be audited later.
53+
The key vault administrator can also [enable logging of Key Vault audit events](../azure-monitor/insights/azure-key-vault.md), so they can be audited later.
5454

55-
When the server is configured to use the customer-managed key stored in the Key Vault, the server sends the DEK to the Key Vault for encryptions. Key Vault returns the encrypted DEK, which is stored in the user database. Similarly, when needed, the server sends the protected DEK to the Key Vault for decryption. Auditors can use Azure Monitor to review Key Vault audit event logs, if logging is enabled.
55+
When the server is configured to use the customer-managed key stored in the key vault, the server sends the DEK to the key vault for encryptions. Key Vault returns the encrypted DEK, which is stored in the user database. Similarly, when needed, the server sends the protected DEK to the key vault for decryption. Auditors can use Azure Monitor to review Key Vault audit event logs, if logging is enabled.
5656

5757
## Requirements for configuring data encryption for Azure Database for PostgreSQL Single server
5858

5959
The following are requirements for configuring Key Vault:
6060

6161
* Key Vault and Azure Database for PostgreSQL Single server must belong to the same Azure Active Directory (Azure AD) tenant. Cross-tenant Key Vault and server interactions aren't supported. Moving resources afterwards requires you to reconfigure the data encryption.
62-
* You must enable the soft-delete feature on the Key Vault, to protect from data loss if an accidental key (or Key Vault) deletion happens. Soft-deleted resources are retained for 90 days, unless the user recovers or purges them in the meantime. The recover and purge actions have their own permissions associated in a Key Vault access policy. The soft-delete feature is off by default, but you can enable it through PowerShell or the Azure CLI (note that you can't enable it through the Azure portal).
63-
* Grant the Azure Database for PostgreSQL Single server access to the Key Vault with the get, wrapKey, and unwrapKey permissions by using its unique managed identity. In the Azure portal, the unique identity is automatically created when data encryption is enabled on the PostgreSQL Single server. See [Data encryption for Azure Database for PostgreSQL Single server by using the Azure portal](howto-data-encryption-portal.md) for detailed, step-by-step instructions when you're using the Azure portal.
62+
* You must enable the soft-delete feature on the key vault, to protect from data loss if an accidental key (or Key Vault) deletion happens. Soft-deleted resources are retained for 90 days, unless the user recovers or purges them in the meantime. The recover and purge actions have their own permissions associated in a Key Vault access policy. The soft-delete feature is off by default, but you can enable it through PowerShell or the Azure CLI (note that you can't enable it through the Azure portal).
63+
* Grant the Azure Database for PostgreSQL Single server access to the key vault with the get, wrapKey, and unwrapKey permissions by using its unique managed identity. In the Azure portal, the unique identity is automatically created when data encryption is enabled on the PostgreSQL Single server. See [Data encryption for Azure Database for PostgreSQL Single server by using the Azure portal](howto-data-encryption-portal.md) for detailed, step-by-step instructions when you're using the Azure portal.
6464

6565
* When you're using a firewall with Key Vault, you must enable the option **Allow trusted Microsoft services to bypass the firewall**.
6666

@@ -69,7 +69,7 @@ The following are requirements for configuring the customer-managed key:
6969
* The customer-managed key to be used for encrypting the DEK can be only asymmetric, RSA 2028.
7070
* The key activation date (if set) must be a date and time in the past. The expiration date (if set) must be a future date and time.
7171
* The key must be in the *Enabled* state.
72-
* If you're importing an existing key into the Key Vault, make sure to provide it in the supported file formats (`.pfx`, `.byok`, `.backup`).
72+
* If you're importing an existing key into the key vault, make sure to provide it in the supported file formats (`.pfx`, `.byok`, `.backup`).
7373

7474
## Recommendations
7575

@@ -94,10 +94,10 @@ When you configure data encryption with a customer-managed key in Key Vault, con
9494

9595
It might happen that someone with sufficient access rights to Key Vault accidentally disables server access to the key by:
9696

97-
* Revoking Key Vault's get, wrapKey, and unwrapKey permissions from the server.
97+
* Revoking the key vault's get, wrapKey, and unwrapKey permissions from the server.
9898
* Deleting the key.
9999
* Deleting the key vault.
100-
* Changing Key Vault's firewall rules.
100+
* Changing the key vault's firewall rules.
101101

102102
* Deleting the managed identity of the server in Azure AD.
103103

0 commit comments

Comments
 (0)