Skip to content

Commit 7635478

Browse files
Merge pull request #224936 from GennadNY/gennadyk897
Gennadyk897
2 parents c490cee + fddfeb3 commit 7635478

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

articles/postgresql/flexible-server/concepts-compare-single-server-flexible-server.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -114,8 +114,8 @@ The following table provides a list of high-level features and capabilities comp
114114
| PgCron, lo, pglogical | No | Yes |
115115
| pgAudit | Preview | Yes |
116116
| **Security** | | |
117-
| Azure Active Directory Support(AAD) | Yes | Preview |
118-
| Customer managed encryption key(BYOK) | Yes | Preview |
117+
| Azure Active Directory Support(AAD) | Yes | Yes |
118+
| Customer managed encryption key(BYOK) | Yes | Yes |
119119
| SCRAM Authentication (SHA-256) | No | Yes |
120120
| Secure Sockets Layer support (SSL) | Yes | Yes |
121121
| **Other features** | | |

articles/postgresql/flexible-server/concepts-data-encryption.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ When you're using data encryption by using a customer-managed key, here are reco
103103
:::image type="content" source="media/concepts-data-encryption/key-vault-trusted-service.png" alt-text="Screenshot of an image of networking screen with trusted-service-with-AKV setting." lightbox="media/concepts-data-encryption/key-vault-trusted-service.png":::
104104

105105
> [!NOTE]
106-
>Important to note, that after choosing **disable public access** option in Azure Key Vault networking and allowing only *trusted Microsoft* services you may see error similar to following : *You have enabled the network access control. Only allowed networks will have access to this key vault* while attempting to administer Azure Key Vault via portal through public access, since portal is not considered to be trusted service.
106+
>Important to note, that after choosing **disable public access** option in Azure Key Vault networking and allowing only *trusted Microsoft* services you may see error similar to following : *You have enabled the network access control. Only allowed networks will have access to this key vault* while attempting to administer Azure Key Vault via portal through public access. This doesn't preclude ability to provide key during CMK setup or fetch keys from Azure Key Vault during server operations.
107107
108108
Here are recommendations for configuring a customer-managed key:
109109

0 commit comments

Comments
 (0)