Skip to content

Commit 6d7dc39

Browse files
Merge pull request #301881 from EldertGrootenboer/patch-5
Added conditions where CMK is considered as disabled
2 parents e083061 + 2f4189b commit 6d7dc39

File tree

1 file changed

+7
-0
lines changed

1 file changed

+7
-0
lines changed

articles/service-bus-messaging/configure-customer-managed-key.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,13 @@ You can use Azure Key Vault (including Azure Key Vault Managed Hardware Security
1616

1717
If you only need to encrypt certain properties of your messages, consider using a library like [NServiceBus](https://docs.particular.net/nservicebus/security/property-encryption).
1818

19+
> [!NOTE]
20+
> A customer-managed keys for is considered disabled in the following scenarios:
21+
> - Revoking access: If Service Bus no longer has permission to access the key in Azure Key Vault.
22+
> - Disabling the key: Manually disabling the key in Key Vault renders it unusable.
23+
> - Letting the key expire: If the key reaches its expiration date without renewal. Letting a key expire has the same effect as revoking or disabling it. Always rotate or renew keys before they expire to avoid unintended outages.
24+
> - Deleting the key: Once deleted, the key is permanently inaccessible.
25+
1926
## Enable customer-managed keys (Azure portal)
2027

2128
To enable customer-managed keys in the Azure portal, follow these steps:

0 commit comments

Comments
 (0)