Skip to content

Commit 7f508d5

Browse files
authored
Merge pull request #116340 from kummanish/patch-6
Updating the setup process for BYOK
2 parents 4ed114b + b3a8507 commit 7f508d5

File tree

1 file changed

+0
-2
lines changed

1 file changed

+0
-2
lines changed

articles/mysql/concepts-data-encryption-mysql.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -62,8 +62,6 @@ The following are requirements for configuring Key Vault:
6262
* You must enable the soft-delete feature on the key vault, to protect from data loss if an accidental key (or Key Vault) deletion happens. Soft-deleted resources are retained for 90 days, unless the user recovers or purges them in the meantime. The recover and purge actions have their own permissions associated in a Key Vault access policy. The soft-delete feature is off by default, but you can enable it through PowerShell or the Azure CLI (note that you can't enable it through the Azure portal).
6363
* Grant the Azure Database for MySQL access to the key vault with the get, wrapKey, and unwrapKey permissions by using its unique managed identity. In the Azure portal, the unique identity is automatically created when data encryption is enabled on the MySQL. See [Configure data encryption for MySQL](howto-data-encryption-portal.md) for detailed, step-by-step instructions when you're using the Azure portal.
6464

65-
* When you're using a firewall with Key Vault, you must enable the option **Allow trusted Microsoft services to bypass the firewall**.
66-
6765
The following are requirements for configuring the customer-managed key:
6866

6967
* The customer-managed key to be used for encrypting the DEK can be only asymmetric, RSA 2028.

0 commit comments

Comments
 (0)