Skip to content

Commit d398a5d

Browse files
Merge pull request #216883 from msmbaldwin/akv-misc
Akv misc
2 parents 33cd86f + ac00995 commit d398a5d

File tree

2 files changed

+4
-1
lines changed

2 files changed

+4
-1
lines changed

articles/key-vault/general/authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ A security principal is an object that represents a user, group, service, or app
1919

2020
* A **group** security principal identifies a set of users created in Azure Active Directory. Any roles or permissions assigned to the group are granted to all of the users within the group.
2121

22-
* A **service principal** is a type of security principal that identifies an application or service, which is to say, a piece of code rather than a user or group. A service principal's object ID is known as its **client ID** and acts like its username. The service principal's **client secret** acts like its password.
22+
* A **service principal** is a type of security principal that identifies an application or service, which is to say, a piece of code rather than a user or group. A service principal's object ID acts like its username; the service principal's **client secret** acts like its password.
2323

2424
For applications, there are two ways to obtain a service principal:
2525

articles/key-vault/keys/byok-specification.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -72,6 +72,9 @@ Use the **az keyvault key create** command to create KEK with key operations set
7272
az keyvault key create --kty RSA-HSM --size 4096 --name KEKforBYOK --ops import --vault-name ContosoKeyVaultHSM
7373
```
7474

75+
> [!NOTE]
76+
> Services support different KEK lengths; Azure SQL, for instance, only supports key lengths of [2048 or 3072 bytes](/azure/azure-sql/database/transparent-data-encryption-byok-overview#requirements-for-configuring-customer-managed-tde). Consult the documentation for your service for specifics.
77+
7578
### Step 2: Retrieve the public key of the KEK
7679

7780
Download the public key portion of the KEK and store it into a PEM file.

0 commit comments

Comments
 (0)