Skip to content

Commit 2376efc

Browse files
committed
Updating data encryption docs
1 parent 83a59e9 commit 2376efc

File tree

2 files changed

+16
-5
lines changed

2 files changed

+16
-5
lines changed

articles/mysql/concepts-data-encryption-mysql.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ The following are requirements for configuring Key Vault:
6666

6767
The following are requirements for configuring the customer-managed key:
6868

69-
* The customer-managed key to be used for encrypting the DEK can be only asymmetric, RSA 2028.
69+
* The customer-managed key to be used for encrypting the DEK can be only asymmetric, RSA 2048.
7070
* The key activation date (if set) must be a date and time in the past. The expiration date (if set) must be a future date and time.
7171
* The key must be in the *Enabled* state.
7272
* If you're importing an existing key into the key vault, make sure to provide it in the supported file formats (`.pfx`, `.byok`, `.backup`).
@@ -88,7 +88,13 @@ Here are recommendations for configuring a customer-managed key:
8888

8989
## Inaccessible customer-managed key condition
9090

91-
When you configure data encryption with a customer-managed key in Key Vault, continuous access to this key is required for the server to stay online. If the server loses access to the customer-managed key in Key Vault, the server begins denying all connections within 10 minutes. The server issues a corresponding error message, and changes the server state to *Inaccessible*. The only action allowed on a database in this state is deleting it.
91+
When you configure data encryption with a customer-managed key in Key Vault, continuous access to this key is required for the server to stay online. If the server loses access to the customer-managed key in Key Vault, the server begins denying all connections within 10 minutes. The server issues a corresponding error message, and changes the server state to *Inaccessible*. Some of the reason why the server can reach this state are:
92+
93+
* If we create a Point In Time Restore server for your Azure Database for MySQL which has data encryption enabled, the newly created server will be in *Inaccessible* state. You can fix this through [Azure portal](howto-data-encryption-portal.md#using-data-encryption-for-restore-or-replica-servers) or [CLI](howto-data-encryption-cli.md#using-data-encryption-for-restore-or-replica-servers).
94+
* If we create a read replica for your Azure Database for MySQL which has data encryption enabled, the newly replica server will be in *Inaccessible* state. You can fix this through [Azure portal](howto-data-encryption-portal.md#using-data-encryption-for-restore-or-replica-servers) or [CLI](howto-data-encryption-cli.md#using-data-encryption-for-restore-or-replica-servers).
95+
* If you delete the KeyVault, the Azure Database for MySQL will be unable to access the key and will move to *Inaccessible* state. Recover the [Key Vault](../key-vault/general/soft-delete-cli.md#deleting-and-purging-key-vault-objects) and re-validate the data encryption to make the server *Available*.
96+
* If we delete the key from the KeyVault, the Azure Database for MySQL will be unable to access the key and will move to *Inaccessible* state. Recover the [Key](../key-vault/general/soft-delete-cli.md#deleting-and-purging-key-vault-objects) and re-validate the data encryption to make the server *Available*.
97+
* If the key stored in the Azure KeyVault expires, the key will become invalid and the Azure Database for MySQL will transition into *Inaccessible* state. Extend the key expiry date using [CLI](https://docs.microsoft.com/cli/azure/keyvault/key?view=azure-cli-latest#az-keyvault-key-set-attributes) and then re-validate the data encryption to make the server *Available*.
9298

9399
### Accidental key access revocation from Key Vault
94100

@@ -98,7 +104,6 @@ It might happen that someone with sufficient access rights to Key Vault accident
98104
* Deleting the key.
99105
* Deleting the key vault.
100106
* Changing the key vault's firewall rules.
101-
102107
* Deleting the managed identity of the server in Azure AD.
103108

104109
## Monitor the customer-managed key in Key Vault

articles/postgresql/concepts-data-encryption-postgresql.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ The following are requirements for configuring Key Vault:
6565

6666
The following are requirements for configuring the customer-managed key:
6767

68-
* The customer-managed key to be used for encrypting the DEK can be only asymmetric, RSA 2028.
68+
* The customer-managed key to be used for encrypting the DEK can be only asymmetric, RSA 2048.
6969
* The key activation date (if set) must be a date and time in the past. The expiration date (if set) must be a future date and time.
7070
* The key must be in the *Enabled* state.
7171
* If you're importing an existing key into the key vault, make sure to provide it in the supported file formats (`.pfx`, `.byok`, `.backup`).
@@ -87,7 +87,13 @@ Here are recommendations for configuring a customer-managed key:
8787

8888
## Inaccessible customer-managed key condition
8989

90-
When you configure data encryption with a customer-managed key in Key Vault, continuous access to this key is required for the server to stay online. If the server loses access to the customer-managed key in Key Vault, the server begins denying all connections within 10 minutes. The server issues a corresponding error message, and changes the server state to *Inaccessible*. The only action allowed on a database in this state is deleting it.
90+
When you configure data encryption with a customer-managed key in Key Vault, continuous access to this key is required for the server to stay online. If the server loses access to the customer-managed key in Key Vault, the server begins denying all connections within 10 minutes. The server issues a corresponding error message, and changes the server state to *Inaccessible*. Some of the reason why the server can reach this state are:
91+
92+
* If we create a Point In Time Restore server for your Azure Database for PostgreSQL Single server which has data encryption enabled, the newly created server will be in *Inaccessible* state. You can fix this through [Azure portal](howto-data-encryption-portal.md#using-data-encryption-for-restore-or-replica-servers) or [CLI](howto-data-encryption-cli.md#using-data-encryption-for-restore-or-replica-servers).
93+
* If we create a read replica for your Azure Database for PostgreSQL Single server which has data encryption enabled, the newly replica server will be in *Inaccessible* state. You can fix this through [Azure portal](howto-data-encryption-portal.md#using-data-encryption-for-restore-or-replica-servers) or [CLI](howto-data-encryption-cli.md#using-data-encryption-for-restore-or-replica-servers).
94+
* If you delete the KeyVault, the Azure Database for PostgreSQL Single server will be unable to access the key and will move to *Inaccessible* state. Recover the [Key Vault](../key-vault/general/soft-delete-cli.md#deleting-and-purging-key-vault-objects) and re-validate the data encryption to make the server *Available*.
95+
* If we delete the key from the KeyVault, the Azure Database for PostgreSQL Single server will be unable to access the key and will move to *Inaccessible* state. Recover the [Key](../key-vault/general/soft-delete-cli.md#deleting-and-purging-key-vault-objects) and re-validate the data encryption to make the server *Available*.
96+
* If the key stored in the Azure KeyVault expires, the key will become invalid and the Azure Database for PostgreSQL Single server will transition into *Inaccessible* state. Extend the key expiry date using [CLI](https://docs.microsoft.com/cli/azure/keyvault/key?view=azure-cli-latest#az-keyvault-key-set-attributes) and then re-validate the data encryption to make the server *Available*.
9197

9298
### Accidental key access revocation from Key Vault
9399

0 commit comments

Comments
 (0)