Skip to content

Commit 5fb6078

Browse files
authored
Merge pull request #183436 from shohamMSFT/patch-17
Update transparent-data-encryption-byok-configure.md
2 parents 44f995f + 0bfe3e5 commit 5fb6078

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/azure-sql/database/transparent-data-encryption-byok-configure.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.date: 06/23/2021
2020
This article walks through how to use a key from Azure Key Vault for Transparent Data Encryption (TDE) on Azure SQL Database or Azure Synapse Analytics. To learn more about the TDE with Azure Key Vault integration - Bring Your Own Key (BYOK) Support, visit [TDE with customer-managed keys in Azure Key Vault](transparent-data-encryption-byok-overview.md).
2121

2222
> [!NOTE]
23-
> Azure SQL now supports using a RSA key stored in a Managed HSM as TDE Protector. This feature is in **public preview**. Azure Key Vault Managed HSM is a fully managed, highly available, single-tenant, standards-compliant cloud service that enables you to safeguard cryptographic keys for your cloud applications, using FIPS 140-2 Level 3 validated HSMs. Learn more about [Managed HSMs](../../key-vault/managed-hsm/index.yml).
23+
> Azure SQL now supports using a RSA key stored in a Managed HSM as TDE Protector. Azure Key Vault Managed HSM is a fully managed, highly available, single-tenant, standards-compliant cloud service that enables you to safeguard cryptographic keys for your cloud applications, using FIPS 140-2 Level 3 validated HSMs. Learn more about [Managed HSMs](../../key-vault/managed-hsm/index.yml).
2424
2525
> [!NOTE]
2626
> This article applies to Azure SQL Database, Azure SQL Managed Instance, and Azure Synapse Analytics (dedicated SQL pools (formerly SQL DW)). For documentation on Transparent Data Encryption for dedicated SQL pools inside Synapse workspaces, see [Azure Synapse Analytics encryption](../../synapse-analytics/security/workspaces-encryption.md).
@@ -38,7 +38,7 @@ This article walks through how to use a key from Azure Key Vault for Transparent
3838
- No expiration date
3939
- Not disabled
4040
- Able to perform *get*, *wrap key*, *unwrap key* operations
41-
- **(In Preview)** To use a Managed HSM key, follow instructions to [create and activate a Managed HSM using Azure CLI](../../key-vault/managed-hsm/quick-create-cli.md)
41+
- To use a Managed HSM key, follow instructions to [create and activate a Managed HSM using Azure CLI](../../key-vault/managed-hsm/quick-create-cli.md)
4242

4343
# [PowerShell](#tab/azure-powershell)
4444

@@ -83,7 +83,7 @@ For adding permissions to your server on a Managed HSM, add the 'Managed HSM Cry
8383
- Use the [Get-AzSqlServerTransparentDataEncryptionProtector](/powershell/module/az.sql/get-azsqlservertransparentdataencryptionprotector) cmdlet to confirm that the TDE protector was configured as intended.
8484

8585
> [!NOTE]
86-
> **(In Preview)** For Managed HSM keys, use Az.Sql 2.11.1 version of PowerShell.
86+
> For Managed HSM keys, use Az.Sql 2.11.1 version of PowerShell.
8787
8888
> [!NOTE]
8989
> The combined length for the key vault name and key name cannot exceed 94 characters.

0 commit comments

Comments
 (0)