Skip to content

Commit a576d58

Browse files
authored
Merge pull request #104203 from VanMSFT/tdeakv
Adding information on permission delay
2 parents f6e6d63 + ca8b66e commit a576d58

File tree

3 files changed

+7
-2
lines changed

3 files changed

+7
-2
lines changed
Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
> [!NOTE]
2+
> It may take around 10 minutes for any permission changes to take effect for the key vault. This includes revoking access permissions to the TDE protector in AKV, and users within this time frame may still have access permissions.

articles/sql-database/transparent-data-encryption-byok-azure-sql-remove-tde-protector.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: conceptual
1010
author: jaszymas
1111
ms.author: jaszymas
1212
ms.reviewer: vanto
13-
ms.date: 03/12/2019
13+
ms.date: 02/12/2020
1414
---
1515
# Remove a Transparent Data Encryption (TDE) protector using PowerShell
1616

@@ -175,6 +175,8 @@ For command reference, see the [Azure CLI keyvault](/cli/azure/keyvault/key).
175175
2. Back up the key material of the TDE protector in Key Vault.
176176
3. Remove the potentially compromised key from Key Vault
177177

178+
[!INCLUDE [sql-database-akv-permission-delay](includes/sql-database-akv-permission-delay.md)]
179+
178180
## Next steps
179181

180182
- Learn how to rotate the TDE protector of a server to comply with security requirements: [Rotate the Transparent Data Encryption protector Using PowerShell](transparent-data-encryption-byok-azure-sql-key-rotation.md)

articles/sql-database/transparent-data-encryption-byok-azure-sql.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.topic: conceptual
1010
author: jaszymas
1111
ms.author: jaszymas
1212
ms.reviewer: vanto
13-
ms.date: 02/03/2019
13+
ms.date: 02/12/2020
1414
---
1515
# Azure SQL Transparent Data Encryption with customer-managed key
1616

@@ -59,6 +59,7 @@ When needed, server sends protected DEK to the key vault for decryption.
5959

6060
Auditors can use Azure Monitor to review key vault AuditEvent logs, if logging is enabled.
6161

62+
[!INCLUDE [sql-database-akv-permission-delay](includes/sql-database-akv-permission-delay.md)]
6263

6364
## Requirements for configuring customer-managed TDE
6465

0 commit comments

Comments
 (0)