Skip to content

Commit a2e3b13

Browse files
committed
Learn Editor: Update how-to-data-encryption-portal.md
1 parent 9601be4 commit a2e3b13

File tree

2 files changed

+2
-1
lines changed

2 files changed

+2
-1
lines changed

articles/mysql/flexible-server/how-to-data-encryption-portal.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ In this tutorial, you learn how to:
2323
- Configure data encryption for replica servers.
2424

2525
> [!NOTE]
26-
> Azure key vault access configuration now supports two types of permission models - [Azure role-based access control](../../role-based-access-control/overview.md) and [Vault access policy](../../key-vault/general/assign-access-policy.md). The tutorial describes configuring data encryption for Azure Database for MySQL flexible server using Vault access policy. However, you can choose to use Azure RBAC as permission model to grant access to Azure Key Vault. To do so, you need any built-in or custom role that has below three permissions and assign it through "role assignments" using Access control (IAM) tab in the keyvault: a) KeyVault/vaults/keys/wrap/action b) KeyVault/vaults/keys/unwrap/action c) KeyVault/vaults/keys/read
26+
> Azure key vault access configuration now supports two types of permission models - [Azure role-based access control](../../role-based-access-control/overview.md) and [Vault access policy](../../key-vault/general/assign-access-policy.md). The tutorial describes configuring data encryption for Azure Database for MySQL flexible server using Vault access policy. However, you can choose to use Azure RBAC as permission model to grant access to Azure Key Vault. To do so, you need any built-in or custom role that has below three permissions and assign it through "role assignments" using Access control (IAM) tab in the keyvault: a) KeyVault/vaults/keys/wrap/action b) KeyVault/vaults/keys/unwrap/action c) KeyVault/vaults/keys/read. For Azure key vault managed HSM, you will also need to assign the "Managed HSM Crypto Service Encryption User" role assignment in RBAC.
2727
2828

2929

@@ -101,6 +101,7 @@ After your Azure Database for MySQL flexible server instance is encrypted with a
101101
## Next steps
102102

103103
- [Customer managed keys data encryption](concepts-customer-managed-key.md)
104+
104105
- [Data encryption with Azure CLI](how-to-data-encryption-cli.md)
105106

106107

Loading

0 commit comments

Comments
 (0)