Skip to content

Commit 4cd47f8

Browse files
authored
Updating the setup process for BYOK
Updating the setup process for BYOK
1 parent 90f3b5a commit 4cd47f8

File tree

1 file changed

+0
-2
lines changed

1 file changed

+0
-2
lines changed

articles/postgresql/concepts-data-encryption-postgresql.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,8 +61,6 @@ The following are requirements for configuring Key Vault:
6161
* You must enable the soft-delete feature on the key vault, to protect from data loss if an accidental key (or Key Vault) deletion happens. Soft-deleted resources are retained for 90 days, unless the user recovers or purges them in the meantime. The recover and purge actions have their own permissions associated in a Key Vault access policy. The soft-delete feature is off by default, but you can enable it through PowerShell or the Azure CLI (note that you can't enable it through the Azure portal).
6262
* Grant the Azure Database for PostgreSQL Single server access to the key vault with the get, wrapKey, and unwrapKey permissions by using its unique managed identity. In the Azure portal, the unique identity is automatically created when data encryption is enabled on the PostgreSQL Single server. See [Data encryption for Azure Database for PostgreSQL Single server by using the Azure portal](howto-data-encryption-portal.md) for detailed, step-by-step instructions when you're using the Azure portal.
6363

64-
* When you're using a firewall with Key Vault, you must enable the option **Allow trusted Microsoft services to bypass the firewall**.
65-
6664
The following are requirements for configuring the customer-managed key:
6765

6866
* The customer-managed key to be used for encrypting the DEK can be only asymmetric, RSA 2028.

0 commit comments

Comments
 (0)