Skip to content

Commit 98d41df

Browse files
Merge pull request #126149 from changeworld/patch-200
Fix typo
2 parents affa25e + 7bb075b commit 98d41df

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/load-testing/how-to-configure-customer-managed-keys.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -41,18 +41,18 @@ Azure Load Testing uses the customer-managed key to encrypt the following data i
4141

4242
- Azure Load Testing can't automatically rotate the customer-managed key to use the latest version of the encryption key. You should update the key URI in the resource after the key is rotated in the Azure Key Vault.
4343

44-
## Configure your Azure key vault
44+
## Configure your Azure Key Vault
4545

4646
To use customer-managed encryption keys with Azure Load Testing, you need to store the key in Azure Key Vault. You can use an existing key vault or create a new one. The load testing resource and key vault may be in different regions or subscriptions in the same tenant.
4747

4848
Make sure to configure the following key vault settings when you use customer-managed encryption keys.
4949

5050
### Configure key vault networking settings
5151

52-
If you restricted access to your Azure key vault by a firewall or virtual networking, you need to grant access to Azure Load Testing for retrieving your customer-managed keys. Follow these steps to [grant access to trusted Azure services](/azure/key-vault/general/overview-vnet-service-endpoints#grant-access-to-trusted-azure-services).
52+
If you restricted access to your Azure Key Vault by a firewall or virtual networking, you need to grant access to Azure Load Testing for retrieving your customer-managed keys. Follow these steps to [grant access to trusted Azure services](/azure/key-vault/general/overview-vnet-service-endpoints#grant-access-to-trusted-azure-services).
5353

5454
> [!IMPORTANT]
55-
> Retrieving customer-managed keys from a private Azure key vault that has access restrictions is currently not supported in **US Gov Virginia** region.
55+
> Retrieving customer-managed keys from a private Azure Key Vault that has access restrictions is currently not supported in **US Gov Virginia** region.
5656
5757
### Configure soft delete and purge protection
5858

@@ -147,7 +147,7 @@ az keyvault key create \
147147

148148
When you use customer-managed encryption keys, you have to specify a user-assigned managed identity. The user-assigned managed identity for accessing the customer-managed keys in Azure Key Vault must have appropriate permissions to access the key vault.
149149

150-
1. In the [Azure portal](https://portal.azure.com), go to the Azure key vault instance that you plan to use to host your encryption keys.
150+
1. In the [Azure portal](https://portal.azure.com), go to the Azure Key Vault instance that you plan to use to host your encryption keys.
151151

152152
1. Select **Access Policies** from the left menu.
153153

0 commit comments

Comments
 (0)