Skip to content

Commit 8d9351c

Browse files
author
Jill Grant
authored
Merge pull request #281669 from tameikal-msft/docs-editor/how-to-data-encryption-portal-1721787716
Update how-to-data-encryption-portal.md
2 parents 7795e3f + 73670f9 commit 8d9351c

File tree

2 files changed

+2
-1
lines changed

2 files changed

+2
-1
lines changed

articles/mysql/flexible-server/how-to-data-encryption-portal.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ In this tutorial, you learn how to:
2323
- Configure data encryption for replica servers.
2424

2525
> [!NOTE]
26-
> Azure key vault access configuration now supports two types of permission models - [Azure role-based access control](../../role-based-access-control/overview.md) and [Vault access policy](../../key-vault/general/assign-access-policy.md). The tutorial describes configuring data encryption for Azure Database for MySQL flexible server using Vault access policy. However, you can choose to use Azure RBAC as permission model to grant access to Azure Key Vault. To do so, you need any built-in or custom role that has below three permissions and assign it through "role assignments" using Access control (IAM) tab in the keyvault: a) KeyVault/vaults/keys/wrap/action b) KeyVault/vaults/keys/unwrap/action c) KeyVault/vaults/keys/read
26+
> Azure key vault access configuration now supports two types of permission models - [Azure role-based access control](../../role-based-access-control/overview.md) and [Vault access policy](../../key-vault/general/assign-access-policy.md). The tutorial describes configuring data encryption for Azure Database for MySQL flexible server using Vault access policy. However, you can choose to use Azure RBAC as permission model to grant access to Azure Key Vault. To do so, you need any built-in or custom role that has below three permissions and assign it through "role assignments" using Access control (IAM) tab in the keyvault: a) KeyVault/vaults/keys/wrap/action b) KeyVault/vaults/keys/unwrap/action c) KeyVault/vaults/keys/read. For Azure key vault managed HSM, you will also need to assign the "Managed HSM Crypto Service Encryption User" role assignment in RBAC.
2727
2828

2929

@@ -101,6 +101,7 @@ After your Azure Database for MySQL flexible server instance is encrypted with a
101101
## Next steps
102102

103103
- [Customer managed keys data encryption](concepts-customer-managed-key.md)
104+
104105
- [Data encryption with Azure CLI](how-to-data-encryption-cli.md)
105106

106107

Loading

0 commit comments

Comments
 (0)