Skip to content

Commit e1a9b32

Browse files
committed
Adding new content for data encryption
1 parent 1826e6d commit e1a9b32

File tree

2 files changed

+9
-9
lines changed

2 files changed

+9
-9
lines changed

articles/mysql/howto-data-encryption-portal.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,9 @@ ms.date: 01/10/2020
1010

1111
# Data Encryption for Azure Database for MySQL server using Azure portal
1212

13-
In this article, you will learn how to set up and manage to use the Azure portal to setup Data Encryption for your Azure Database for MySQL.
13+
In this article, you will learn how to set up and manage to use the Azure portal to set up Data Encryption for your Azure Database for MySQL.
1414

15-
## Prerequisites for Cli
15+
## Prerequisites for CLI
1616

1717
* You must have an Azure subscription and be an administrator on that subscription.
1818
* Create an Azure Key Vault and Key to use for customer-managed key.
@@ -39,7 +39,7 @@ In this article, you will learn how to set up and manage to use the Azure portal
3939
4040
![Access policy overview](media/concepts-data-access-and-security-data-encryption/show-access-policy-overview.png)
4141
42-
2. Select the **Key Permissions** select **Get**, **Wrap**, **Unwrap** and the **Principal** which is the name of the MySQL server. If your server principal can't be found in the list of existing principals, you will need to register it by attempting to setup Data Encryption for the first time which will fail.
42+
2. Select the **Key Permissions** select **Get**, **Wrap**, **Unwrap** and the **Principal**, which is the name of the MySQL server. If your server principal can't be found in the list of existing principals, you will need to register it by attempting to set up Data Encryption for the first time, which will fail.
4343
4444
![Access policy overview](media/concepts-data-access-and-security-data-encryption/access-policy-warp-unwrap.png)
4545
@@ -59,7 +59,7 @@ In this article, you will learn how to set up and manage to use the Azure portal
5959
6060
4. To ensure all files (including **temp files**) are full encrypted, a server **restart** is **required**.
6161
62-
## Restoring or creating replica of the server which has Data Encryption enabled
62+
## Restoring or creating replica of the server, which has Data Encryption enabled
6363
6464
Once an Azure Database for MySQL is encrypted with customer's managed key stored in the Key Vault, any newly created copy of the server either though local or geo-restore operation or a replica (local/cross-region) operation. So for an encrypted MySQL server, you can follow the steps below to create an encrypted restored server.
6565
@@ -78,7 +78,7 @@ Once an Azure Database for MySQL is encrypted with customer's managed key stored
7878
3. To fix Inaccessible state, you need to revalidate the key on the restored server. Click on the **Data Encryption** blade and then the **Revalidate key** button.
7979
8080
> [!NOTE]
81-
> The first attempt to revalidate will fail since the new server's service principal needs to be given access to the key vault. To generate the service principal click on **Revalidate key** which will give error but generates the service principal. Thereafter, refer to steps [in section 2](https://docs.microsoft.com/azure/mysql/howto-data-encryption-portal#setting-the-right-permissions-for-key-operations) above.
81+
> The first attempt to revalidate will fail since the new server's service principal needs to be given access to the key vault. To generate the service principal click on **Revalidate key**, which will give error but generates the service principal. Thereafter, refer to steps [in section 2](https://docs.microsoft.com/azure/mysql/howto-data-encryption-portal#setting-the-right-permissions-for-key-operations) above.
8282
8383
![revalidate server](media/concepts-data-access-and-security-data-encryption/show-revalidate-data-encryption.png)
8484

articles/postgresql/howto-data-encryption-portal.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.date: 01/10/2020
1212

1313
In this article, you will learn how to set up and manage to use the Azure portal to set up Data Encryption for your Azure Database for PostgreSQL Single server.
1414

15-
## Prerequisites for Cli
15+
## Prerequisites for CLI
1616

1717
* You must have an Azure subscription and be an administrator on that subscription.
1818
* Create an Azure Key Vault and Key to use for customer-managed key.
@@ -40,7 +40,7 @@ In this article, you will learn how to set up and manage to use the Azure portal
4040
4141
![Access policy overview](media/concepts-data-access-and-security-data-encryption/show-access-policy-overview.png)
4242
43-
2. Under the **Key Permissions** select **Get**, **Wrap**, **Unwrap** and the **Principal** which is the name of the PostgreSQL server. If your server principal can't be found in the list of existing principals, you will need to register it by attempting to setup Data Encryption for the first time which will fail.
43+
2. Under the **Key Permissions** select **Get**, **Wrap**, **Unwrap** and the **Principal**, which is the name of the PostgreSQL server. If your server principal can't be found in the list of existing principals, you will need to register it by attempting to set up Data Encryption for the first time, which will fail.
4444
4545
![Access policy overview](media/concepts-data-access-and-security-data-encryption/access-policy-warp-unwrap.png)
4646
@@ -60,7 +60,7 @@ In this article, you will learn how to set up and manage to use the Azure portal
6060
6161
4. To ensure all files (including **temp files**) are full encrypted, a server **restart** is **required**.
6262
63-
## Restoring or creating replica of the server which has data encryption enabled
63+
## Restoring or creating replica of the server, which has data encryption enabled
6464
6565
Once an Azure Database for PostgreSQL Single server is encrypted with customer's managed key stored in the Key Vault, any newly created copy of the server either though local or geo-restore operation or a replica (local/cross-region) operation. So for an encrypted PostgreSQL server, you can follow the steps below to create an encrypted restored server.
6666
@@ -80,7 +80,7 @@ Once an Azure Database for PostgreSQL Single server is encrypted with customer's
8080
3. To fix Inaccessible state, you need to revalidate the key on the restored server. Click on the **Data Encryption** blade and then the **Revalidate key** button.
8181
8282
> [!NOTE]
83-
> The first attempt to revalidate will fail since the new server's service principal needs to be given access to the key vault. To generate the service principal click on **Revalidate key** which will give error but generates the service principal. Thereafter, refer to steps [in section 2](https://docs.microsoft.com/azure/postgresql/howto-data-encryption-portal#setting-the-right-permissions-for-key-operations) above.
83+
> The first attempt to revalidate will fail since the new server's service principal needs to be given access to the key vault. To generate the service principal click on **Revalidate key**, which will give error but generates the service principal. Thereafter, refer to steps [in section 2](https://docs.microsoft.com/azure/postgresql/howto-data-encryption-portal#setting-the-right-permissions-for-key-operations) above.
8484
8585
![revalidate server](media/concepts-data-access-and-security-data-encryption/show-revalidate-data-encryption.png)
8686

0 commit comments

Comments
 (0)