Skip to content

Commit 7eeea19

Browse files
authored
Merge pull request #197626 from tamram/tamram22-0509
GitHub issue fixes - May 2022 (part 1)
2 parents 95191be + 8ca2abb commit 7eeea19

13 files changed

+75
-75
lines changed

articles/storage/blobs/encryption-customer-provided-keys.md

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
title: Provide an encryption key on a request to Blob storage
33
titleSuffix: Azure Storage
4-
description: Clients making requests against Azure Blob storage have the option to provide an encryption key on a per-request basis. Including the encryption key on the request provides granular control over encryption settings for Blob storage operations.
4+
description: Clients making requests against Azure Blob storage can provide an encryption key on a per-request basis. Including the encryption key on the request provides granular control over encryption settings for Blob storage operations.
55
services: storage
66
author: tamram
77

88
ms.service: storage
9-
ms.date: 12/14/2020
9+
ms.date: 05/09/2022
1010
ms.topic: conceptual
1111
ms.author: tamram
1212
ms.reviewer: ozgun
@@ -15,21 +15,23 @@ ms.subservice: common
1515

1616
# Provide an encryption key on a request to Blob storage
1717

18-
Clients making requests against Azure Blob storage have the option to provide an AES-256 encryption key on a per-request basis. Including the encryption key on the request provides granular control over encryption settings for Blob storage operations. Customer-provided keys can be stored in Azure Key Vault or in another key store.
18+
Clients making requests against Azure Blob storage can provide an AES-256 encryption key to encrypt that blob on a write operation. Subsequent requests to read or write to the blob must include the same key. Including the encryption key on the request provides granular control over encryption settings for Blob storage operations. Customer-provided keys can be stored in Azure Key Vault or in another key store.
1919

2020
## Encrypting read and write operations
2121

2222
When a client application provides an encryption key on the request, Azure Storage performs encryption and decryption transparently while reading and writing blob data. Azure Storage writes an SHA-256 hash of the encryption key alongside the blob's contents. The hash is used to verify that all subsequent operations against the blob use the same encryption key.
2323

24-
Azure Storage does not store or manage the encryption key that the client sends with the request. The key is securely discarded as soon as the encryption or decryption process is complete.
24+
Azure Storage doesn't store or manage the encryption key that the client sends with the request. The key is securely discarded as soon as the encryption or decryption process is complete.
2525

26-
When a client creates or updates a blob using a customer-provided key on the request, then subsequent read and write requests for that blob must also provide the key. If the key is not provided on a request for a blob that has already been encrypted with a customer-provided key, then the request fails with error code 409 (Conflict).
26+
When a client creates or updates a blob using a customer-provided key on the request, then subsequent read and write requests for that blob must also provide the key. If the key isn't provided on a request for a blob that has already been encrypted with a customer-provided key, then the request fails with error code 409 (Conflict).
2727

2828
If the client application sends an encryption key on the request, and the storage account is also encrypted using a Microsoft-managed key or a customer-managed key, then Azure Storage uses the key provided on the request for encryption and decryption.
2929

3030
To send the encryption key as part of the request, a client must establish a secure connection to Azure Storage using HTTPS.
3131

32-
Each blob snapshot can have its own encryption key.
32+
Each blob snapshot or blob version can have its own encryption key.
33+
34+
Object replication isn't supported for blobs in the source account that are encrypted with a customer-provided key.
3335

3436
## Request headers for specifying customer-provided keys
3537

@@ -63,7 +65,7 @@ The following Blob storage operations support sending customer-provided encrypti
6365

6466
## Rotate customer-provided keys
6567

66-
To rotate an encryption key that was used to encrypt a blob, download the blob and then re-upload it with the new encryption key.
68+
To rotate an encryption key that was used to encrypt a blob, download the blob and then reupload it with the new encryption key.
6769

6870
> [!IMPORTANT]
6971
> The Azure portal cannot be used to read from or write to a container or blob that is encrypted with a key provided on the request.
@@ -72,7 +74,7 @@ To rotate an encryption key that was used to encrypt a blob, download the blob a
7274
7375
## Feature support
7476

75-
This table shows how this feature is supported in your account and the impact on support when you enable certain capabilities.
77+
This table shows how this feature is supported in your account and the effect on that support when you enable certain capabilities.
7678

7779
| Storage account type | Blob Storage (default support) | Data Lake Storage Gen2 <sup>1</sup> | NFS 3.0 <sup>1</sup> | SFTP <sup>1</sup> |
7880
|--|--|--|--|--|

0 commit comments

Comments
 (0)