Skip to content

Commit c8799d9

Browse files
Merge pull request #248674 from VandhanaMehta/docs-editor/how-to-data-encryption-portal-1692348994
Update how-to-data-encryption-portal.md
2 parents 386c0e7 + 25d6b72 commit c8799d9

File tree

1 file changed

+7
-0
lines changed

1 file changed

+7
-0
lines changed

articles/mysql/flexible-server/how-to-data-encryption-portal.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,11 @@ In this tutorial, you learn how to:
2222
- Configure data encryption for restoration.
2323
- Configure data encryption for replica servers.
2424

25+
> [!NOTE]
26+
> Azure key vault access configuration now supports two types of permission models - [Azure role-based access control](../../role-based-access-control/overview.md) and [Vault access policy](../../key-vault/general/assign-access-policy.md). The tutorial describes configuring data encryption for Azure Database for MySQL - Flexible server using Vault access policy. However, you can choose to use Azure RBAC as permission model to grant access to Azure Key Vault. To do so, you need any built-in or custom role that has below three permissions and assign it through "role assignments" using Access control (IAM) tab in the keyvault: a) KeyVault/vaults/keys/wrap/action b) KeyVault/vaults/keys/unwrap/action c) KeyVault/vaults/keys/read
27+
28+
29+
2530
## Prerequisites
2631

2732
- An Azure account with an active subscription.
@@ -97,3 +102,5 @@ After your Azure Database for MySQL - Flexible Server is encrypted with a custom
97102

98103
- [Customer managed keys data encryption](concepts-customer-managed-key.md)
99104
- [Data encryption with Azure CLI](how-to-data-encryption-cli.md)
105+
106+

0 commit comments

Comments
 (0)