Skip to content

Commit 5712072

Browse files
authored
lightbox
1 parent 567c38b commit 5712072

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

articles/cosmos-db/postgresql/how-to-customer-managed-keys.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -48,13 +48,13 @@ ms.date: 04/06/2023
4848

4949
Learn more about [User Assigned Managed Identity.](../../active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md?pivots=identity-mi-methods-azp#create-a-user-assigned-managed-identity).
5050

51-
1. ### Key Vault
51+
### Key Vault
5252

5353
Using customer-managed keys with Azure Cosmos DB for PostgreSQL requires you to set two properties on the Azure Key Vault instance that you plan to use to host your encryption keys: Soft Delete and Purge Protection.
5454

5555
1. If you create a new Azure Key Vault instance, enable these properties during creation:
5656

57-
![Screenshot of Key Vault's properties.](media/how-to-customer-managed-keys/key-vault-soft-delete.png)
57+
[ ![Screenshot of Key Vault's properties.](media/how-to-customer-managed-keys/key-vault-soft-delete.png)](media/how-to-customer-managed-keys/key-vault-soft-delete.png#lightbox)
5858

5959
1. If you're using an existing Azure Key Vault instance, you can verify that these properties are enabled by looking at the Properties section on the Azure portal. If any of these properties aren’t enabled, see the "Enabling soft delete" and "Enabling Purge Protection" sections in one of the following articles.
6060

@@ -66,29 +66,29 @@ ms.date: 04/06/2023
6666
> [!IMPORTANT]
6767
> Your Azure Key Vault instance must be allow public access from all the networks.
6868
69-
1. ### Add an Access Policy to the Key Vault
69+
### Add an Access Policy to the Key Vault
7070

7171
1. From the Azure portal, go to the Azure Key Vault instance that you plan to use to host your encryption keys. Select Access configuration from the left menu and then select Go to access policies.
7272

73-
![Screenshot of Key Vault's access configuration.](media/how-to-customer-managed-keys/access-policy.png)
73+
[ ![Screenshot of Key Vault's access configuration.](media/how-to-customer-managed-keys/access-policy.png)](media/how-to-customer-managed-keys/access-policy.png#lightbox)
7474

7575
1. Select + Create.
7676

7777
1. In the Permissions Tab under the Key permissions drop-down menu, select Get, Unwrap Key, and Wrap Key permissions.
7878

79-
![Screenshot of Key Vault's permissions settings.](media/how-to-customer-managed-keys/access-policy-permissions.png)
79+
[ ![Screenshot of Key Vault's permissions settings.](media/how-to-customer-managed-keys/access-policy-permissions.png)] (media/how-to-customer-managed-keys/access-policy-permissions.png#lightbox)
8080

8181
1. In the Principal Tab, select the User Assigned Managed Identity you had created in prerequisite step.
8282

8383
1. Navigate to Review + create select Create.
8484

85-
1. ### Create / Import Key
85+
### Create / Import Key
8686

8787
1. From the Azure portal, go to the Azure Key Vault instance that you plan to use to host your encryption keys.
8888

8989
1. Select Keys from the left menu and then select +Generate/Import.
9090

91-
![Screenshot of Key generation page.](media/how-to-customer-managed-keys/create-key.png)
91+
[ ![Screenshot of Key generation page.](media/how-to-customer-managed-keys/create-key.png)](media/how-to-customer-managed-keys/create-key.png#lightbox)
9292

9393
1. The customer-managed key to be used for encrypting the DEK can only be asymmetric RSA Key type. All RSA Key sizes 2048, 3072 and 4096 are supported.
9494

@@ -105,7 +105,7 @@ ms.date: 04/06/2023
105105
# [Portal](#tab/portal)
106106

107107
1. During the provisioning of a new Cosmos DB for PostgreSQL cluster, after providing the necessary information under Basics and Networking Tab, Navigate to the Encryption (Preview) Tab.
108-
![Screenshot of Encrytion configuration page.](media/how-to-customer-managed-keys/encryption-tab.png)
108+
[ ![Screenshot of Encrytion configuration page.](media/how-to-customer-managed-keys/encryption-tab.png)](media/how-to-customer-managed-keys/encryption-tab.png#lightbox)
109109

110110
1. Select Customer Managed Key under Data encryption key option.
111111

@@ -254,7 +254,7 @@ Encryption configuration can be changed from service managed encryption to CMK e
254254
# [Portal](#tab/portal)
255255

256256
1. Navigate to the Data Encryption blade, and select Initiate restore operation. Alternatively, you can perform PITR by selecting the Restore option in the overview blade.
257-
![Screenshot of PITR.](media/how-to-customer-managed-keys/point-in-time-restore.png)
257+
[ ![Screenshot of PITR.](media/how-to-customer-managed-keys/point-in-time-restore.png)](media/how-to-customer-managed-keys/point-in-time-restore.png#lightbox)
258258

259259
1. You can change/configure the Data Encryption from the Encryption(preview) Tab.
260260

0 commit comments

Comments
 (0)