Skip to content

Commit 1826e6d

Browse files
committed
Adding new content for data encryption
1 parent aacb16b commit 1826e6d

File tree

2 files changed

+16
-14
lines changed

2 files changed

+16
-14
lines changed

articles/mysql/howto-data-encryption-portal.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -12,10 +12,9 @@ ms.date: 01/10/2020
1212

1313
In this article, you will learn how to set up and manage to use the Azure portal to setup Data Encryption for your Azure Database for MySQL.
1414

15-
## Prerequisites for PowerShell
15+
## Prerequisites for Cli
1616

1717
* You must have an Azure subscription and be an administrator on that subscription.
18-
* You must have Azure PowerShell installed and running.
1918
* Create an Azure Key Vault and Key to use for customer-managed key.
2019
* The Key Vault must have the following property to use as a customer-managed key
2120
* [Soft Delete](https://docs.microsoft.com/azure/key-vault/key-vault-ovw-soft-delete)
@@ -40,7 +39,7 @@ In this article, you will learn how to set up and manage to use the Azure portal
4039
4140
![Access policy overview](media/concepts-data-access-and-security-data-encryption/show-access-policy-overview.png)
4241
43-
2. Select the **Key Permissions** select **Get**, **Wrap**, **Unwrap** and the **Principal** which is the name of the MySQL server.
42+
2. Select the **Key Permissions** select **Get**, **Wrap**, **Unwrap** and the **Principal** which is the name of the MySQL server. If your server principal can't be found in the list of existing principals, you will need to register it by attempting to setup Data Encryption for the first time which will fail.
4443
4544
![Access policy overview](media/concepts-data-access-and-security-data-encryption/access-policy-warp-unwrap.png)
4645
@@ -58,7 +57,7 @@ In this article, you will learn how to set up and manage to use the Azure portal
5857
5958
3. **Save** the settings.
6059
61-
4. To ensure all files (including temp files) are full encrypted, a server restart is required.
60+
4. To ensure all files (including **temp files**) are full encrypted, a server **restart** is **required**.
6261
6362
## Restoring or creating replica of the server which has Data Encryption enabled
6463
@@ -76,17 +75,19 @@ Once an Azure Database for MySQL is encrypted with customer's managed key stored
7675
7776
![Mark server inaccessible](media/concepts-data-access-and-security-data-encryption/show-restore-data-encryption.png)
7877
79-
3. To fix Inaccessible state, you need to revalidate the key on the restored server.
78+
3. To fix Inaccessible state, you need to revalidate the key on the restored server. Click on the **Data Encryption** blade and then the **Revalidate key** button.
79+
80+
> [!NOTE]
81+
> The first attempt to revalidate will fail since the new server's service principal needs to be given access to the key vault. To generate the service principal click on **Revalidate key** which will give error but generates the service principal. Thereafter, refer to steps [in section 2](https://docs.microsoft.com/azure/mysql/howto-data-encryption-portal#setting-the-right-permissions-for-key-operations) above.
8082
8183
![revalidate server](media/concepts-data-access-and-security-data-encryption/show-revalidate-data-encryption.png)
8284
8385
You will have to give access to the new server to the Key Vault.
8486
85-
4. Once you revalidate the key, the server resumes its normal functionality.
87+
4. After registering the service principal, you will need to revalidate the key again and the server resumes its normal functionality.
8688
8789
![Normal server restored](media/concepts-data-access-and-security-data-encryption/restore-successful.png)
8890
89-
9091
## Next steps
9192
9293
To learn more about Data Encryption, see [what is Azure data encryption](concepts-data-encryption-mysql.md).

articles/postgresql/howto-data-encryption-portal.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -12,10 +12,9 @@ ms.date: 01/10/2020
1212

1313
In this article, you will learn how to set up and manage to use the Azure portal to set up Data Encryption for your Azure Database for PostgreSQL Single server.
1414

15-
## Prerequisites for PowerShell
15+
## Prerequisites for Cli
1616

1717
* You must have an Azure subscription and be an administrator on that subscription.
18-
* You must have Azure PowerShell installed and running.
1918
* Create an Azure Key Vault and Key to use for customer-managed key.
2019
* The Key vault must have the following property to use as a customer-managed key
2120
* [Soft Delete](https://docs.microsoft.com/azure/key-vault/key-vault-ovw-soft-delete)
@@ -41,7 +40,7 @@ In this article, you will learn how to set up and manage to use the Azure portal
4140
4241
![Access policy overview](media/concepts-data-access-and-security-data-encryption/show-access-policy-overview.png)
4342
44-
2. Under the **Key Permissions** select **Get**, **Wrap**, **Unwrap** and the **Principal** which is the name of the PostgreSQL server.
43+
2. Under the **Key Permissions** select **Get**, **Wrap**, **Unwrap** and the **Principal** which is the name of the PostgreSQL server. If your server principal can't be found in the list of existing principals, you will need to register it by attempting to setup Data Encryption for the first time which will fail.
4544
4645
![Access policy overview](media/concepts-data-access-and-security-data-encryption/access-policy-warp-unwrap.png)
4746
@@ -59,7 +58,7 @@ In this article, you will learn how to set up and manage to use the Azure portal
5958
6059
3. **Save** the settings.
6160
62-
4. To ensure all files (including temp files) are full encrypted, a server restart is required.
61+
4. To ensure all files (including **temp files**) are full encrypted, a server **restart** is **required**.
6362
6463
## Restoring or creating replica of the server which has data encryption enabled
6564
@@ -78,17 +77,19 @@ Once an Azure Database for PostgreSQL Single server is encrypted with customer's
7877
![Mark server inaccessible](media/concepts-data-access-and-security-data-encryption/show-restore-data-encryption.png)
7978
8079
81-
3. To fix Inaccessible state, you need to revalidate the key on the restored server.
80+
3. To fix Inaccessible state, you need to revalidate the key on the restored server. Click on the **Data Encryption** blade and then the **Revalidate key** button.
81+
82+
> [!NOTE]
83+
> The first attempt to revalidate will fail since the new server's service principal needs to be given access to the key vault. To generate the service principal click on **Revalidate key** which will give error but generates the service principal. Thereafter, refer to steps [in section 2](https://docs.microsoft.com/azure/postgresql/howto-data-encryption-portal#setting-the-right-permissions-for-key-operations) above.
8284
8385
![revalidate server](media/concepts-data-access-and-security-data-encryption/show-revalidate-data-encryption.png)
8486
8587
You will have to give access to the new server to the Key Vault.
8688
87-
4. Once you revalidate the key, the server resumes its normal functionality.
89+
4. After registering the service principal, you will need to revalidate the key again and the server resumes its normal functionality.
8890
8991
![Normal server restored](media/concepts-data-access-and-security-data-encryption/restore-successful.png)
9092
91-
9293
## Next steps
9394
9495
To learn more about Data Encryption, see [what is Azure data encryption](concepts-data-encryption-postgresql.md).

0 commit comments

Comments
 (0)