You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: includes/virtual-machines-sql-server-akv-next-steps.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,23 +19,23 @@ The following Transact-SQL scripts provide examples for each of these areas.
19
19
20
20
### Prerequisites for examples
21
21
22
-
Each example is based on the two prerequisites: an asymmetric key from your key vault called **CONTOSO_KEY** and a credential created by the AKV Integration feature called **Azure_EKM_TDE_cred**. The following Transact-SQL commands setup these prerequisites for running the examples.
22
+
Each example is based on the two prerequisites: an asymmetric key from your key vault called **CONTOSO_KEY** and a credential created by the AKV Integration feature called **Azure_EKM_cred**. The following Transact-SQL commands setup these prerequisites for running the examples.
23
23
24
24
```sql
25
25
USE master;
26
26
GO
27
27
28
28
--create credential
29
29
--The <<SECRET>> here requires the <Application ID> (without hyphens) and <Secret> to be passed together without a space between them.
30
-
CREATE CREDENTIAL sysadmin_ekm_cred
30
+
CREATE CREDENTIAL Azure_EKM_cred
31
31
WITH IDENTITY ='keytestvault', --keyvault
32
32
SECRET ='<<SECRET>>'
33
33
FOR CRYPTOGRAPHIC PROVIDER AzureKeyVault_EKM_Prov;
34
34
35
35
36
36
--Map the credential to a SQL login that has sysadmin permissions. This allows the SQL login to access the key vault when creating the asymmetric key in the next step.
0 commit comments