Skip to content

Commit 6c8bbe8

Browse files
authored
formatting
1 parent 0a50f86 commit 6c8bbe8

File tree

1 file changed

+24
-24
lines changed

1 file changed

+24
-24
lines changed

articles/cosmos-db/postgresql/how-to-customer-managed-keys.md

Lines changed: 24 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -36,69 +36,69 @@ ms.date: 04/06/2023
3636

3737
### User Assigned Managed Identity
3838

39-
1. Search for Managed Identities in the global search bar.
39+
1. Search for Managed Identities in the global search bar.
4040

41-
![Screenshot of Managed Identities in Azure portal.](media/how-to-customer-managed-keys/user-assigned-managed-identity.png)
41+
![Screenshot of Managed Identities in Azure portal.](media/how-to-customer-managed-keys/user-assigned-managed-identity.png)
4242

4343

44-
1. Create a new User assigned managed Identity in the same region as your Azure Cosmos DB for PostgreSQL cluster.
44+
1. Create a new User assigned managed Identity in the same region as your Azure Cosmos DB for PostgreSQL cluster.
4545

46-
![Screenshot of User assigned managed Identity page in Azure portal.](media/how-to-customer-managed-keys/user-assigned-managed-identity-provisioning.png)
46+
![Screenshot of User assigned managed Identity page in Azure portal.](media/how-to-customer-managed-keys/user-assigned-managed-identity-provisioning.png)
4747

4848

49-
Learn more about [User Assigned Managed Identity.](../../active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md?pivots=identity-mi-methods-azp#create-a-user-assigned-managed-identity).
49+
Learn more about [User Assigned Managed Identity.](../../active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md?pivots=identity-mi-methods-azp#create-a-user-assigned-managed-identity).
5050

5151
### Key Vault
5252

53-
Using customer-managed keys with Azure Cosmos DB for PostgreSQL requires you to set two properties on the Azure Key Vault instance that you plan to use to host your encryption keys: Soft Delete and Purge Protection.
53+
Using customer-managed keys with Azure Cosmos DB for PostgreSQL requires you to set two properties on the Azure Key Vault instance that you plan to use to host your encryption keys: Soft Delete and Purge Protection.
5454

55-
1. If you create a new Azure Key Vault instance, enable these properties during creation:
55+
1. If you create a new Azure Key Vault instance, enable these properties during creation:
5656

5757
[ ![Screenshot of Key Vault's properties.](media/how-to-customer-managed-keys/key-vault-soft-delete.png) ](media/how-to-customer-managed-keys/key-vault-soft-delete.png#lightbox)
5858

59-
1. If you're using an existing Azure Key Vault instance, you can verify that these properties are enabled by looking at the Properties section on the Azure portal. If any of these properties aren’t enabled, see the "Enabling soft delete" and "Enabling Purge Protection" sections in one of the following articles.
59+
1. If you're using an existing Azure Key Vault instance, you can verify that these properties are enabled by looking at the Properties section on the Azure portal. If any of these properties aren’t enabled, see the "Enabling soft delete" and "Enabling Purge Protection" sections in one of the following articles.
6060

61-
* How to use [soft-delete with PowerShell.](../../key-vault/general/key-vault-recovery.md)
62-
* How to use [soft-delete with Azure CLI.](../../key-vault/general/key-vault-recovery.md)
61+
* How to use [soft-delete with PowerShell.](../../key-vault/general/key-vault-recovery.md)
62+
* How to use [soft-delete with Azure CLI.](../../key-vault/general/key-vault-recovery.md)
6363

64-
1. The key Vault must be set with 90 days for 'Days to retain deleted vaults'. If the existing key Vault has been configured with a lower number, you'll need to create a new key vault as it can't be modified after creation.
64+
1. The key Vault must be set with 90 days for 'Days to retain deleted vaults'. If the existing key Vault has been configured with a lower number, you'll need to create a new key vault as it can't be modified after creation.
6565

6666
> [!IMPORTANT]
6767
> Your Azure Key Vault instance must be allow public access from all the networks.
6868
6969
### Add an Access Policy to the Key Vault
7070

71-
1. From the Azure portal, go to the Azure Key Vault instance that you plan to use to host your encryption keys. Select Access configuration from the left menu and then select Go to access policies.
71+
1. From the Azure portal, go to the Azure Key Vault instance that you plan to use to host your encryption keys. Select Access configuration from the left menu and then select Go to access policies.
7272

7373
[ ![Screenshot of Key Vault's access configuration.](media/how-to-customer-managed-keys/access-policy.png) ](media/how-to-customer-managed-keys/access-policy.png#lightbox)
7474

75-
1. Select + Create.
75+
1. Select + Create.
7676

77-
1. In the Permissions Tab under the Key permissions drop-down menu, select Get, Unwrap Key, and Wrap Key permissions.
77+
1. In the Permissions Tab under the Key permissions drop-down menu, select Get, Unwrap Key, and Wrap Key permissions.
7878

79-
[ ![Screenshot of Key Vault's permissions settings.](media/how-to-customer-managed-keys/access-policy-permissions.png) ] (media/how-to-customer-managed-keys/access-policy-permissions.png#lightbox)
79+
[ ![Screenshot of Key Vault's permissions settings.](media/how-to-customer-managed-keys/access-policy-permissions.png ](media/how-to-customer-managed-keys/access-policy-permissions.png#lightbox)
8080

81-
1. In the Principal Tab, select the User Assigned Managed Identity you had created in prerequisite step.
81+
1. In the Principal Tab, select the User Assigned Managed Identity you had created in prerequisite step.
8282

83-
1. Navigate to Review + create select Create.
83+
1. Navigate to Review + create select Create.
8484

8585
### Create / Import Key
8686

87-
1. From the Azure portal, go to the Azure Key Vault instance that you plan to use to host your encryption keys.
87+
1. From the Azure portal, go to the Azure Key Vault instance that you plan to use to host your encryption keys.
8888

89-
1. Select Keys from the left menu and then select +Generate/Import.
89+
1. Select Keys from the left menu and then select +Generate/Import.
9090

9191
[ ![Screenshot of Key generation page.](media/how-to-customer-managed-keys/create-key.png) ](media/how-to-customer-managed-keys/create-key.png#lightbox)
9292

93-
1. The customer-managed key to be used for encrypting the DEK can only be asymmetric RSA Key type. All RSA Key sizes 2048, 3072 and 4096 are supported.
93+
1. The customer-managed key to be used for encrypting the DEK can only be asymmetric RSA Key type. All RSA Key sizes 2048, 3072 and 4096 are supported.
9494

95-
1. The key activation date (if set) must be a date and time in the past. The expiration date (if set) must be a future date and time.
95+
1. The key activation date (if set) must be a date and time in the past. The expiration date (if set) must be a future date and time.
9696

97-
1. The key must be in the Enabled state.
97+
1. The key must be in the Enabled state.
9898

99-
1. If you're importing an existing key into the key vault, make sure to provide it in the supported file formats (`.pfx`, `.byok`, `.backup`).
99+
1. If you're importing an existing key into the key vault, make sure to provide it in the supported file formats (`.pfx`, `.byok`, `.backup`).
100100

101-
1. If you're manually rotating the key, the old key version shouldn't be deleted for at least 24 hours.
101+
1. If you're manually rotating the key, the old key version shouldn't be deleted for at least 24 hours.
102102

103103
### Enable CMK encryption during the provisioning for a new cluster
104104

0 commit comments

Comments
 (0)