Skip to content

Commit cb6ceb4

Browse files
authored
lightbox fixes
1 parent 5712072 commit cb6ceb4

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/cosmos-db/postgresql/how-to-customer-managed-keys.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ ms.date: 04/06/2023
3434

3535
## Detailed steps
3636

37-
1. ### User Assigned Managed Identity
37+
### User Assigned Managed Identity
3838

3939
1. Search for Managed Identities in the global search bar.
4040

@@ -54,7 +54,7 @@ ms.date: 04/06/2023
5454

5555
1. If you create a new Azure Key Vault instance, enable these properties during creation:
5656

57-
[ ![Screenshot of Key Vault's properties.](media/how-to-customer-managed-keys/key-vault-soft-delete.png)](media/how-to-customer-managed-keys/key-vault-soft-delete.png#lightbox)
57+
[ ![Screenshot of Key Vault's properties.](media/how-to-customer-managed-keys/key-vault-soft-delete.png)](media/how-to-customer-managed-keys/key-vault-soft-delete.png#lightbox)
5858

5959
1. If you're using an existing Azure Key Vault instance, you can verify that these properties are enabled by looking at the Properties section on the Azure portal. If any of these properties aren’t enabled, see the "Enabling soft delete" and "Enabling Purge Protection" sections in one of the following articles.
6060

@@ -70,13 +70,13 @@ ms.date: 04/06/2023
7070

7171
1. From the Azure portal, go to the Azure Key Vault instance that you plan to use to host your encryption keys. Select Access configuration from the left menu and then select Go to access policies.
7272

73-
[ ![Screenshot of Key Vault's access configuration.](media/how-to-customer-managed-keys/access-policy.png)](media/how-to-customer-managed-keys/access-policy.png#lightbox)
73+
[ ![Screenshot of Key Vault's access configuration.](media/how-to-customer-managed-keys/access-policy.png)](media/how-to-customer-managed-keys/access-policy.png#lightbox)
7474

7575
1. Select + Create.
7676

7777
1. In the Permissions Tab under the Key permissions drop-down menu, select Get, Unwrap Key, and Wrap Key permissions.
7878

79-
[ ![Screenshot of Key Vault's permissions settings.](media/how-to-customer-managed-keys/access-policy-permissions.png)] (media/how-to-customer-managed-keys/access-policy-permissions.png#lightbox)
79+
[ ![Screenshot of Key Vault's permissions settings.](media/how-to-customer-managed-keys/access-policy-permissions.png)] (media/how-to-customer-managed-keys/access-policy-permissions.png#lightbox)
8080

8181
1. In the Principal Tab, select the User Assigned Managed Identity you had created in prerequisite step.
8282

@@ -88,7 +88,7 @@ ms.date: 04/06/2023
8888

8989
1. Select Keys from the left menu and then select +Generate/Import.
9090

91-
[ ![Screenshot of Key generation page.](media/how-to-customer-managed-keys/create-key.png)](media/how-to-customer-managed-keys/create-key.png#lightbox)
91+
[ ![Screenshot of Key generation page.](media/how-to-customer-managed-keys/create-key.png)](media/how-to-customer-managed-keys/create-key.png#lightbox)
9292

9393
1. The customer-managed key to be used for encrypting the DEK can only be asymmetric RSA Key type. All RSA Key sizes 2048, 3072 and 4096 are supported.
9494

@@ -100,7 +100,7 @@ ms.date: 04/06/2023
100100

101101
1. If you're manually rotating the key, the old key version shouldn't be deleted for at least 24 hours.
102102

103-
1. ### Enable CMK encryption during the provisioning for a new cluster
103+
### Enable CMK encryption during the provisioning for a new cluster
104104

105105
# [Portal](#tab/portal)
106106

@@ -116,7 +116,7 @@ ms.date: 04/06/2023
116116
1. Select the Key created in the previous step, and then select Review+create.
117117

118118
1. Verify that CMK is encryption is enabled by Navigating to the Data Encryption(preview) blade of the Cosmos DB for PostgreSQL cluster in the Azure portal.
119-
![Sreenshot of data encryption tab.](media/how-to-customer-managed-keys/data-encryption-tab-note.png)
119+
![Screenshot of data encryption tab.](media/how-to-customer-managed-keys/data-encryption-tab-note.png)
120120

121121
> [!NOTE]
122122
> Data encryption can only be configured during the creation of a new cluster and can't be updated on an existing cluster. A workaround for updating the encryption configuration on an existing cluster is to restore an existing PITR backup to a new cluster and configure the data encryption during the creation of the newly restored cluster.

0 commit comments

Comments
 (0)