You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/cosmos-db/postgresql/how-to-customer-managed-keys.md
+24-24Lines changed: 24 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,69 +36,69 @@ ms.date: 04/06/2023
36
36
37
37
### User Assigned Managed Identity
38
38
39
-
1. Search for Managed Identities in the global search bar.
39
+
1. Search for Managed Identities in the global search bar.
40
40
41
-

41
+

42
42
43
43
44
-
1. Create a new User assigned managed Identity in the same region as your Azure Cosmos DB for PostgreSQL cluster.
44
+
1. Create a new User assigned managed Identity in the same region as your Azure Cosmos DB for PostgreSQL cluster.
45
45
46
-

46
+

47
47
48
48
49
-
Learn more about [User Assigned Managed Identity.](../../active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md?pivots=identity-mi-methods-azp#create-a-user-assigned-managed-identity).
49
+
Learn more about [User Assigned Managed Identity.](../../active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md?pivots=identity-mi-methods-azp#create-a-user-assigned-managed-identity).
50
50
51
51
### Key Vault
52
52
53
-
Using customer-managed keys with Azure Cosmos DB for PostgreSQL requires you to set two properties on the Azure Key Vault instance that you plan to use to host your encryption keys: Soft Delete and Purge Protection.
53
+
Using customer-managed keys with Azure Cosmos DB for PostgreSQL requires you to set two properties on the Azure Key Vault instance that you plan to use to host your encryption keys: Soft Delete and Purge Protection.
54
54
55
-
1. If you create a new Azure Key Vault instance, enable these properties during creation:
55
+
1. If you create a new Azure Key Vault instance, enable these properties during creation:
56
56
57
57
[](media/how-to-customer-managed-keys/key-vault-soft-delete.png#lightbox)
58
58
59
-
1. If you're using an existing Azure Key Vault instance, you can verify that these properties are enabled by looking at the Properties section on the Azure portal. If any of these properties aren’t enabled, see the "Enabling soft delete" and "Enabling Purge Protection" sections in one of the following articles.
59
+
1. If you're using an existing Azure Key Vault instance, you can verify that these properties are enabled by looking at the Properties section on the Azure portal. If any of these properties aren’t enabled, see the "Enabling soft delete" and "Enabling Purge Protection" sections in one of the following articles.
60
60
61
-
* How to use [soft-delete with PowerShell.](../../key-vault/general/key-vault-recovery.md)
62
-
* How to use [soft-delete with Azure CLI.](../../key-vault/general/key-vault-recovery.md)
61
+
* How to use [soft-delete with PowerShell.](../../key-vault/general/key-vault-recovery.md)
62
+
* How to use [soft-delete with Azure CLI.](../../key-vault/general/key-vault-recovery.md)
63
63
64
-
1. The key Vault must be set with 90 days for 'Days to retain deleted vaults'. If the existing key Vault has been configured with a lower number, you'll need to create a new key vault as it can't be modified after creation.
64
+
1. The key Vault must be set with 90 days for 'Days to retain deleted vaults'. If the existing key Vault has been configured with a lower number, you'll need to create a new key vault as it can't be modified after creation.
65
65
66
66
> [!IMPORTANT]
67
67
> Your Azure Key Vault instance must be allow public access from all the networks.
68
68
69
69
### Add an Access Policy to the Key Vault
70
70
71
-
1. From the Azure portal, go to the Azure Key Vault instance that you plan to use to host your encryption keys. Select Access configuration from the left menu and then select Go to access policies.
71
+
1. From the Azure portal, go to the Azure Key Vault instance that you plan to use to host your encryption keys. Select Access configuration from the left menu and then select Go to access policies.
72
72
73
73
[](media/how-to-customer-managed-keys/access-policy.png#lightbox)
74
74
75
-
1. Select + Create.
75
+
1. Select + Create.
76
76
77
-
1. In the Permissions Tab under the Key permissions drop-down menu, select Get, Unwrap Key, and Wrap Key permissions.
77
+
1. In the Permissions Tab under the Key permissions drop-down menu, select Get, Unwrap Key, and Wrap Key permissions.
78
78
79
-
[](media/how-to-customer-managed-keys/access-policy-permissions.png#lightbox)
79
+
[
80
80
81
-
1. In the Principal Tab, select the User Assigned Managed Identity you had created in prerequisite step.
81
+
1. In the Principal Tab, select the User Assigned Managed Identity you had created in prerequisite step.
82
82
83
-
1. Navigate to Review + create select Create.
83
+
1. Navigate to Review + create select Create.
84
84
85
85
### Create / Import Key
86
86
87
-
1. From the Azure portal, go to the Azure Key Vault instance that you plan to use to host your encryption keys.
87
+
1. From the Azure portal, go to the Azure Key Vault instance that you plan to use to host your encryption keys.
88
88
89
-
1. Select Keys from the left menu and then select +Generate/Import.
89
+
1. Select Keys from the left menu and then select +Generate/Import.
90
90
91
91
[](media/how-to-customer-managed-keys/create-key.png#lightbox)
92
92
93
-
1. The customer-managed key to be used for encrypting the DEK can only be asymmetric RSA Key type. All RSA Key sizes 2048, 3072 and 4096 are supported.
93
+
1. The customer-managed key to be used for encrypting the DEK can only be asymmetric RSA Key type. All RSA Key sizes 2048, 3072 and 4096 are supported.
94
94
95
-
1. The key activation date (if set) must be a date and time in the past. The expiration date (if set) must be a future date and time.
95
+
1. The key activation date (if set) must be a date and time in the past. The expiration date (if set) must be a future date and time.
96
96
97
-
1. The key must be in the Enabled state.
97
+
1. The key must be in the Enabled state.
98
98
99
-
1. If you're importing an existing key into the key vault, make sure to provide it in the supported file formats (`.pfx`, `.byok`, `.backup`).
99
+
1. If you're importing an existing key into the key vault, make sure to provide it in the supported file formats (`.pfx`, `.byok`, `.backup`).
100
100
101
-
1. If you're manually rotating the key, the old key version shouldn't be deleted for at least 24 hours.
101
+
1. If you're manually rotating the key, the old key version shouldn't be deleted for at least 24 hours.
102
102
103
103
### Enable CMK encryption during the provisioning for a new cluster
0 commit comments