You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/mysql/concepts-data-encryption-mysql.md
+8-3Lines changed: 8 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -66,7 +66,7 @@ The following are requirements for configuring Key Vault:
66
66
67
67
The following are requirements for configuring the customer-managed key:
68
68
69
-
* The customer-managed key to be used for encrypting the DEK can be only asymmetric, RSA 2028.
69
+
* The customer-managed key to be used for encrypting the DEK can be only asymmetric, RSA 2048.
70
70
* The key activation date (if set) must be a date and time in the past. The expiration date (if set) must be a future date and time.
71
71
* The key must be in the *Enabled* state.
72
72
* If you're importing an existing key into the key vault, make sure to provide it in the supported file formats (`.pfx`, `.byok`, `.backup`).
@@ -88,7 +88,13 @@ Here are recommendations for configuring a customer-managed key:
88
88
89
89
## Inaccessible customer-managed key condition
90
90
91
-
When you configure data encryption with a customer-managed key in Key Vault, continuous access to this key is required for the server to stay online. If the server loses access to the customer-managed key in Key Vault, the server begins denying all connections within 10 minutes. The server issues a corresponding error message, and changes the server state to *Inaccessible*. The only action allowed on a database in this state is deleting it.
91
+
When you configure data encryption with a customer-managed key in Key Vault, continuous access to this key is required for the server to stay online. If the server loses access to the customer-managed key in Key Vault, the server begins denying all connections within 10 minutes. The server issues a corresponding error message, and changes the server state to *Inaccessible*. Some of the reason why the server can reach this state are:
92
+
93
+
* If we create a Point In Time Restore server for your Azure Database for MySQL which has data encryption enabled, the newly created server will be in *Inaccessible* state. You can fix this through [Azure portal](howto-data-encryption-portal.md#using-data-encryption-for-restore-or-replica-servers) or [CLI](howto-data-encryption-cli.md#using-data-encryption-for-restore-or-replica-servers).
94
+
* If we create a read replica for your Azure Database for MySQL which has data encryption enabled, the newly replica server will be in *Inaccessible* state. You can fix this through [Azure portal](howto-data-encryption-portal.md#using-data-encryption-for-restore-or-replica-servers) or [CLI](howto-data-encryption-cli.md#using-data-encryption-for-restore-or-replica-servers).
95
+
* If you delete the KeyVault, the Azure Database for MySQL will be unable to access the key and will move to *Inaccessible* state. Recover the [Key Vault](../key-vault/general/soft-delete-cli.md#deleting-and-purging-key-vault-objects) and re-validate the data encryption to make the server *Available*.
96
+
* If we delete the key from the KeyVault, the Azure Database for MySQL will be unable to access the key and will move to *Inaccessible* state. Recover the [Key](../key-vault/general/soft-delete-cli.md#deleting-and-purging-key-vault-objects) and re-validate the data encryption to make the server *Available*.
97
+
* If the key stored in the Azure KeyVault expires, the key will become invalid and the Azure Database for MySQL will transition into *Inaccessible* state. Extend the key expiry date using [CLI](https://docs.microsoft.com/cli/azure/keyvault/key?view=azure-cli-latest#az-keyvault-key-set-attributes) and then re-validate the data encryption to make the server *Available*.
92
98
93
99
### Accidental key access revocation from Key Vault
94
100
@@ -98,7 +104,6 @@ It might happen that someone with sufficient access rights to Key Vault accident
98
104
* Deleting the key.
99
105
* Deleting the key vault.
100
106
* Changing the key vault's firewall rules.
101
-
102
107
* Deleting the managed identity of the server in Azure AD.
Copy file name to clipboardExpand all lines: articles/postgresql/concepts-data-encryption-postgresql.md
+8-2Lines changed: 8 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -65,7 +65,7 @@ The following are requirements for configuring Key Vault:
65
65
66
66
The following are requirements for configuring the customer-managed key:
67
67
68
-
* The customer-managed key to be used for encrypting the DEK can be only asymmetric, RSA 2028.
68
+
* The customer-managed key to be used for encrypting the DEK can be only asymmetric, RSA 2048.
69
69
* The key activation date (if set) must be a date and time in the past. The expiration date (if set) must be a future date and time.
70
70
* The key must be in the *Enabled* state.
71
71
* If you're importing an existing key into the key vault, make sure to provide it in the supported file formats (`.pfx`, `.byok`, `.backup`).
@@ -87,7 +87,13 @@ Here are recommendations for configuring a customer-managed key:
87
87
88
88
## Inaccessible customer-managed key condition
89
89
90
-
When you configure data encryption with a customer-managed key in Key Vault, continuous access to this key is required for the server to stay online. If the server loses access to the customer-managed key in Key Vault, the server begins denying all connections within 10 minutes. The server issues a corresponding error message, and changes the server state to *Inaccessible*. The only action allowed on a database in this state is deleting it.
90
+
When you configure data encryption with a customer-managed key in Key Vault, continuous access to this key is required for the server to stay online. If the server loses access to the customer-managed key in Key Vault, the server begins denying all connections within 10 minutes. The server issues a corresponding error message, and changes the server state to *Inaccessible*. Some of the reason why the server can reach this state are:
91
+
92
+
* If we create a Point In Time Restore server for your Azure Database for PostgreSQL Single server which has data encryption enabled, the newly created server will be in *Inaccessible* state. You can fix this through [Azure portal](howto-data-encryption-portal.md#using-data-encryption-for-restore-or-replica-servers) or [CLI](howto-data-encryption-cli.md#using-data-encryption-for-restore-or-replica-servers).
93
+
* If we create a read replica for your Azure Database for PostgreSQL Single server which has data encryption enabled, the newly replica server will be in *Inaccessible* state. You can fix this through [Azure portal](howto-data-encryption-portal.md#using-data-encryption-for-restore-or-replica-servers) or [CLI](howto-data-encryption-cli.md#using-data-encryption-for-restore-or-replica-servers).
94
+
* If you delete the KeyVault, the Azure Database for PostgreSQL Single server will be unable to access the key and will move to *Inaccessible* state. Recover the [Key Vault](../key-vault/general/soft-delete-cli.md#deleting-and-purging-key-vault-objects) and re-validate the data encryption to make the server *Available*.
95
+
* If we delete the key from the KeyVault, the Azure Database for PostgreSQL Single server will be unable to access the key and will move to *Inaccessible* state. Recover the [Key](../key-vault/general/soft-delete-cli.md#deleting-and-purging-key-vault-objects) and re-validate the data encryption to make the server *Available*.
96
+
* If the key stored in the Azure KeyVault expires, the key will become invalid and the Azure Database for PostgreSQL Single server will transition into *Inaccessible* state. Extend the key expiry date using [CLI](https://docs.microsoft.com/cli/azure/keyvault/key?view=azure-cli-latest#az-keyvault-key-set-attributes) and then re-validate the data encryption to make the server *Available*.
91
97
92
98
### Accidental key access revocation from Key Vault
0 commit comments