Skip to content

Commit d5b53b6

Browse files
authored
Merge pull request #100937 from kummanish/master
Adding new content for data encryption
2 parents aacb16b + e1a9b32 commit d5b53b6

File tree

2 files changed

+19
-17
lines changed

2 files changed

+19
-17
lines changed

articles/mysql/howto-data-encryption-portal.md

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -10,12 +10,11 @@ ms.date: 01/10/2020
1010

1111
# Data Encryption for Azure Database for MySQL server using Azure portal
1212

13-
In this article, you will learn how to set up and manage to use the Azure portal to setup Data Encryption for your Azure Database for MySQL.
13+
In this article, you will learn how to set up and manage to use the Azure portal to set up Data Encryption for your Azure Database for MySQL.
1414

15-
## Prerequisites for PowerShell
15+
## Prerequisites for CLI
1616

1717
* You must have an Azure subscription and be an administrator on that subscription.
18-
* You must have Azure PowerShell installed and running.
1918
* Create an Azure Key Vault and Key to use for customer-managed key.
2019
* The Key Vault must have the following property to use as a customer-managed key
2120
* [Soft Delete](https://docs.microsoft.com/azure/key-vault/key-vault-ovw-soft-delete)
@@ -40,7 +39,7 @@ In this article, you will learn how to set up and manage to use the Azure portal
4039
4140
![Access policy overview](media/concepts-data-access-and-security-data-encryption/show-access-policy-overview.png)
4241
43-
2. Select the **Key Permissions** select **Get**, **Wrap**, **Unwrap** and the **Principal** which is the name of the MySQL server.
42+
2. Select the **Key Permissions** select **Get**, **Wrap**, **Unwrap** and the **Principal**, which is the name of the MySQL server. If your server principal can't be found in the list of existing principals, you will need to register it by attempting to set up Data Encryption for the first time, which will fail.
4443
4544
![Access policy overview](media/concepts-data-access-and-security-data-encryption/access-policy-warp-unwrap.png)
4645
@@ -58,9 +57,9 @@ In this article, you will learn how to set up and manage to use the Azure portal
5857
5958
3. **Save** the settings.
6059
61-
4. To ensure all files (including temp files) are full encrypted, a server restart is required.
60+
4. To ensure all files (including **temp files**) are full encrypted, a server **restart** is **required**.
6261
63-
## Restoring or creating replica of the server which has Data Encryption enabled
62+
## Restoring or creating replica of the server, which has Data Encryption enabled
6463
6564
Once an Azure Database for MySQL is encrypted with customer's managed key stored in the Key Vault, any newly created copy of the server either though local or geo-restore operation or a replica (local/cross-region) operation. So for an encrypted MySQL server, you can follow the steps below to create an encrypted restored server.
6665
@@ -76,17 +75,19 @@ Once an Azure Database for MySQL is encrypted with customer's managed key stored
7675
7776
![Mark server inaccessible](media/concepts-data-access-and-security-data-encryption/show-restore-data-encryption.png)
7877
79-
3. To fix Inaccessible state, you need to revalidate the key on the restored server.
78+
3. To fix Inaccessible state, you need to revalidate the key on the restored server. Click on the **Data Encryption** blade and then the **Revalidate key** button.
79+
80+
> [!NOTE]
81+
> The first attempt to revalidate will fail since the new server's service principal needs to be given access to the key vault. To generate the service principal click on **Revalidate key**, which will give error but generates the service principal. Thereafter, refer to steps [in section 2](https://docs.microsoft.com/azure/mysql/howto-data-encryption-portal#setting-the-right-permissions-for-key-operations) above.
8082
8183
![revalidate server](media/concepts-data-access-and-security-data-encryption/show-revalidate-data-encryption.png)
8284
8385
You will have to give access to the new server to the Key Vault.
8486
85-
4. Once you revalidate the key, the server resumes its normal functionality.
87+
4. After registering the service principal, you will need to revalidate the key again and the server resumes its normal functionality.
8688
8789
![Normal server restored](media/concepts-data-access-and-security-data-encryption/restore-successful.png)
8890
89-
9091
## Next steps
9192
9293
To learn more about Data Encryption, see [what is Azure data encryption](concepts-data-encryption-mysql.md).

articles/postgresql/howto-data-encryption-portal.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -12,10 +12,9 @@ ms.date: 01/10/2020
1212

1313
In this article, you will learn how to set up and manage to use the Azure portal to set up Data Encryption for your Azure Database for PostgreSQL Single server.
1414

15-
## Prerequisites for PowerShell
15+
## Prerequisites for CLI
1616

1717
* You must have an Azure subscription and be an administrator on that subscription.
18-
* You must have Azure PowerShell installed and running.
1918
* Create an Azure Key Vault and Key to use for customer-managed key.
2019
* The Key vault must have the following property to use as a customer-managed key
2120
* [Soft Delete](https://docs.microsoft.com/azure/key-vault/key-vault-ovw-soft-delete)
@@ -41,7 +40,7 @@ In this article, you will learn how to set up and manage to use the Azure portal
4140
4241
![Access policy overview](media/concepts-data-access-and-security-data-encryption/show-access-policy-overview.png)
4342
44-
2. Under the **Key Permissions** select **Get**, **Wrap**, **Unwrap** and the **Principal** which is the name of the PostgreSQL server.
43+
2. Under the **Key Permissions** select **Get**, **Wrap**, **Unwrap** and the **Principal**, which is the name of the PostgreSQL server. If your server principal can't be found in the list of existing principals, you will need to register it by attempting to set up Data Encryption for the first time, which will fail.
4544
4645
![Access policy overview](media/concepts-data-access-and-security-data-encryption/access-policy-warp-unwrap.png)
4746
@@ -59,9 +58,9 @@ In this article, you will learn how to set up and manage to use the Azure portal
5958
6059
3. **Save** the settings.
6160
62-
4. To ensure all files (including temp files) are full encrypted, a server restart is required.
61+
4. To ensure all files (including **temp files**) are full encrypted, a server **restart** is **required**.
6362
64-
## Restoring or creating replica of the server which has data encryption enabled
63+
## Restoring or creating replica of the server, which has data encryption enabled
6564
6665
Once an Azure Database for PostgreSQL Single server is encrypted with customer's managed key stored in the Key Vault, any newly created copy of the server either though local or geo-restore operation or a replica (local/cross-region) operation. So for an encrypted PostgreSQL server, you can follow the steps below to create an encrypted restored server.
6766
@@ -78,17 +77,19 @@ Once an Azure Database for PostgreSQL Single server is encrypted with customer's
7877
![Mark server inaccessible](media/concepts-data-access-and-security-data-encryption/show-restore-data-encryption.png)
7978
8079
81-
3. To fix Inaccessible state, you need to revalidate the key on the restored server.
80+
3. To fix Inaccessible state, you need to revalidate the key on the restored server. Click on the **Data Encryption** blade and then the **Revalidate key** button.
81+
82+
> [!NOTE]
83+
> The first attempt to revalidate will fail since the new server's service principal needs to be given access to the key vault. To generate the service principal click on **Revalidate key**, which will give error but generates the service principal. Thereafter, refer to steps [in section 2](https://docs.microsoft.com/azure/postgresql/howto-data-encryption-portal#setting-the-right-permissions-for-key-operations) above.
8284
8385
![revalidate server](media/concepts-data-access-and-security-data-encryption/show-revalidate-data-encryption.png)
8486
8587
You will have to give access to the new server to the Key Vault.
8688
87-
4. Once you revalidate the key, the server resumes its normal functionality.
89+
4. After registering the service principal, you will need to revalidate the key again and the server resumes its normal functionality.
8890
8991
![Normal server restored](media/concepts-data-access-and-security-data-encryption/restore-successful.png)
9092
91-
9293
## Next steps
9394
9495
To learn more about Data Encryption, see [what is Azure data encryption](concepts-data-encryption-postgresql.md).

0 commit comments

Comments
 (0)