Skip to content

Commit 2a92162

Browse files
committed
update redundancy tables
1 parent 883160a commit 2a92162

File tree

4 files changed

+42
-42
lines changed

4 files changed

+42
-42
lines changed

articles/storage/blobs/encryption-customer-provided-keys.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Provide an encryption key on a request to Blob storage
33
titleSuffix: Azure Storage
4-
description: Clients making requests against Azure Blob storage have the option to provide an encryption key on a per-request basis. Including the encryption key on the request provides granular control over encryption settings for Blob storage operations.
4+
description: Clients making requests against Azure Blob storage can provide an encryption key on a per-request basis. Including the encryption key on the request provides granular control over encryption settings for Blob storage operations.
55
services: storage
66
author: tamram
77

@@ -15,23 +15,23 @@ ms.subservice: common
1515

1616
# Provide an encryption key on a request to Blob storage
1717

18-
Clients making requests against Azure Blob storage have the option to provide an AES-256 encryption key on a per-request basis. Including the encryption key on the request provides granular control over encryption settings for Blob storage operations. Customer-provided keys can be stored in Azure Key Vault or in another key store.
18+
Clients making requests against Azure Blob storage can provide an AES-256 encryption key to encrypt that blob on a write operation. Subsequent requests to read or write to the blob must include the same key. Including the encryption key on the request provides granular control over encryption settings for Blob storage operations. Customer-provided keys can be stored in Azure Key Vault or in another key store.
1919

2020
## Encrypting read and write operations
2121

2222
When a client application provides an encryption key on the request, Azure Storage performs encryption and decryption transparently while reading and writing blob data. Azure Storage writes an SHA-256 hash of the encryption key alongside the blob's contents. The hash is used to verify that all subsequent operations against the blob use the same encryption key.
2323

24-
Azure Storage does not store or manage the encryption key that the client sends with the request. The key is securely discarded as soon as the encryption or decryption process is complete.
24+
Azure Storage doesn't store or manage the encryption key that the client sends with the request. The key is securely discarded as soon as the encryption or decryption process is complete.
2525

26-
When a client creates or updates a blob using a customer-provided key on the request, then subsequent read and write requests for that blob must also provide the key. If the key is not provided on a request for a blob that has already been encrypted with a customer-provided key, then the request fails with error code 409 (Conflict).
26+
When a client creates or updates a blob using a customer-provided key on the request, then subsequent read and write requests for that blob must also provide the key. If the key isn't provided on a request for a blob that has already been encrypted with a customer-provided key, then the request fails with error code 409 (Conflict).
2727

2828
If the client application sends an encryption key on the request, and the storage account is also encrypted using a Microsoft-managed key or a customer-managed key, then Azure Storage uses the key provided on the request for encryption and decryption.
2929

3030
To send the encryption key as part of the request, a client must establish a secure connection to Azure Storage using HTTPS.
3131

3232
Each blob snapshot or blob version can have its own encryption key.
3333

34-
Object replication is not supported for blobs in the source account that are encrypted with a customer-provided key.
34+
Object replication isn't supported for blobs in the source account that are encrypted with a customer-provided key.
3535

3636
## Request headers for specifying customer-provided keys
3737

@@ -74,7 +74,7 @@ To rotate an encryption key that was used to encrypt a blob, download the blob a
7474
7575
## Feature support
7676

77-
This table shows how this feature is supported in your account and the impact on support when you enable certain capabilities.
77+
This table shows how this feature is supported in your account and the effect on that support when you enable certain capabilities.
7878

7979
| Storage account type | Blob Storage (default support) | Data Lake Storage Gen2 <sup>1</sup> | NFS 3.0 <sup>1</sup> | SFTP <sup>1</sup> |
8080
|--|--|--|--|--|

0 commit comments

Comments
 (0)