Skip to content

Commit e5f142a

Browse files
authored
Merge pull request #282094 from markingmyname/tam
[MySQL] Replace image
2 parents ff4149c + b5e499e commit e5f142a

File tree

3 files changed

+13
-18
lines changed

3 files changed

+13
-18
lines changed

articles/mysql/flexible-server/how-to-data-encryption-portal.md

Lines changed: 13 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -3,16 +3,16 @@ title: Set up data encryption by using the Azure portal
33
description: Learn how to set up and manage data encryption for Azure Database for MySQL - Flexible Server by using the Azure portal.
44
author: SudheeshGH
55
ms.author: sunaray
6-
ms.reviewer: maghan
7-
ms.date: 06/18/2024
6+
ms.reviewer: maghan, talawren
7+
ms.date: 07/29/2024
88
ms.service: mysql
99
ms.subservice: flexible-server
1010
ms.topic: how-to
1111
---
1212

1313
# Data encryption for Azure Database for MySQL - Flexible Server by using the Azure portal
1414

15-
[!INCLUDE[applies-to-mysql-flexible-server](../includes/applies-to-mysql-flexible-server.md)]
15+
[!INCLUDE [applies-to-mysql-flexible-server](../includes/applies-to-mysql-flexible-server.md)]
1616

1717
This tutorial shows you how to set up and manage data encryption for Azure Database for MySQL flexible server.
1818

@@ -25,8 +25,6 @@ In this tutorial, you learn how to:
2525
> [!NOTE]
2626
> Azure key vault access configuration now supports two types of permission models - [Azure role-based access control](../../role-based-access-control/overview.md) and [Vault access policy](../../key-vault/general/assign-access-policy.md). The tutorial describes configuring data encryption for Azure Database for MySQL flexible server using Vault access policy. However, you can choose to use Azure RBAC as permission model to grant access to Azure Key Vault. To do so, you need any built-in or custom role that has below three permissions and assign it through "role assignments" using Access control (IAM) tab in the keyvault: a) KeyVault/vaults/keys/wrap/action b) KeyVault/vaults/keys/unwrap/action c) KeyVault/vaults/keys/read. For Azure key vault managed HSM, you will also need to assign the "Managed HSM Crypto Service Encryption User" role assignment in RBAC.
2727
28-
29-
3028
## Prerequisites
3129

3230
- An Azure account with an active subscription.
@@ -39,13 +37,13 @@ In this tutorial, you learn how to:
3937

4038
1. In Key Vault, select **Access policies**, and then select **Create**.
4139

42-
:::image type="content" source="media/how-to-data-encryption-portal/1-mysql-key-vault-access-policy.jpeg" alt-text="Screenshot of Key Vault Access Policy in the Azure portal.":::
40+
:::image type="content" source="media/how-to-data-encryption-portal/1-mysql-key-vault-access-policy.jpeg" alt-text="Screenshot of Key Vault Access Policy in the Azure portal." lightbox="media/how-to-data-encryption-portal/1-mysql-key-vault-access-policy.jpeg":::
4341

4442
1. On the **Permissions** tab, select the following **Key permissions - Get** , **List** , **Wrap Key** , **Unwrap Key**.
4543

4644
1. On the **Principal** tab, select the User-assigned Managed Identity.
4745

48-
:::image type="content" source="media/how-to-data-encryption-portal/2-mysql-principal-tab.jpeg" alt-text="Screenshot of the principal tab in the Azure portal.":::
46+
:::image type="content" source="media/how-to-data-encryption-portal/2-mysql-principal-tab.jpeg" alt-text="Screenshot of the principal tab in the Azure portal." lightbox="media/how-to-data-encryption-portal/2-mysql-principal-tab.jpeg":::
4947

5048
1. Select **Create**.
5149

@@ -55,17 +53,17 @@ To set up the customer managed key, perform the following steps.
5553

5654
1. In the portal, navigate to your Azure Database for MySQL flexible server instance, and then, under **Security** , select **Data encryption**.
5755

58-
:::image type="content" source="media/how-to-data-encryption-portal/3-mysql-data-encryption.jpeg" alt-text="Screenshot of the data encryption page.":::
56+
:::image type="content" source="media/how-to-data-encryption-portal/3-mysql-data-encryption.jpeg" alt-text="Screenshot of the data encryption page." lightbox="media/how-to-data-encryption-portal/3-mysql-data-encryption.jpeg":::
5957

6058
1. On the **Data encryption** page, under **No identity assigned** , select **Change identity** ,
6159

6260
1. In the **Select user assigned**** managed identity **dialog box, select the** demo-umi **identity, and then select** Add**.
6361

64-
:::image type="content" source="media/how-to-data-encryption-portal/4-mysql-assigned-managed-identity-demo-uni.jpeg" alt-text="Screenshot of selecting the demo-umi from the assigned managed identity page.":::
62+
:::image type="content" source="media/how-to-data-encryption-portal/4-mysql-assigned-managed-identity-demo-uni.jpeg" alt-text="Screenshot of selecting the demo-umi from the assigned managed identity page." lightbox="media/how-to-data-encryption-portal/4-mysql-assigned-managed-identity-demo-uni.jpeg":::
6563

6664
1. To the right of **Key selection method** , either **Select a key** and specify a key vault and key pair, or select **Enter a key identifier**.
6765

68-
:::image type="content" source="media/how-to-data-encryption-portal/5-mysql-select-key.jpeg" alt-text="Screenshot of the Select Key page in the Azure portal.":::
66+
:::image type="content" source="media/how-to-data-encryption-portal/5-mysql-configure-encryption-marked.png" alt-text="Screenshot of key selection method to show user." lightbox="media/how-to-data-encryption-portal/5-mysql-configure-encryption-marked.png":::
6967

7068
1. Select **Save**.
7169

@@ -76,32 +74,29 @@ To use data encryption as part of a restore operation, perform the following ste
7674
1. In the Azure portal, on the navigate Overview page for your server, select **Restore**.
7775
1. On the **Security** tab, you specify the identity and the key.
7876

79-
:::image type="content" source="media/how-to-data-encryption-portal/6-mysql-navigate-overview-page.jpeg" alt-text="Screenshot of overview page.":::
77+
:::image type="content" source="media/how-to-data-encryption-portal/6-mysql-navigate-overview-page.jpeg" alt-text="Screenshot of overview page." lightbox="media/how-to-data-encryption-portal/6-mysql-navigate-overview-page.jpeg":::
8078

8179
1. Select **Change identity** and select the **User assigned managed identity** and select on **Add**
8280
**To select the Key** , you can either select a **key vault** and **key pair** or enter a **key identifier**
8381

84-
:::image type="content" source="media/how-to-data-encryption-portal/7-mysql-change-identity.jpeg" alt-text="SCreenshot of the change identity page.":::
82+
:::image type="content" source="media/how-to-data-encryption-portal/7-mysql-change-identity.jpeg" alt-text="SCreenshot of the change identity page." lightbox="media/how-to-data-encryption-portal/7-mysql-change-identity.jpeg":::
8583

8684
## Use Data encryption for replica servers
8785

8886
After your Azure Database for MySQL flexible server instance is encrypted with a customer's managed key stored in Key Vault, any newly created copy of the server is also encrypted.
8987

9088
1. To configuration replication, under **Settings** , select **Replication** , and then select **Add replica**.
9189

92-
:::image type="content" source="media/how-to-data-encryption-portal/8-mysql-replication.jpeg" alt-text="Screenshot of the Replication page.":::
90+
:::image type="content" source="media/how-to-data-encryption-portal/8-mysql-replication.jpeg" alt-text="Screenshot of the Replication page." lightbox="media/how-to-data-encryption-portal/8-mysql-replication.jpeg":::
9391

9492
1. In the Add Replica server to Azure Database for MySQL dialog box, select the appropriate **Compute + storage** option, and then select **OK**.
9593

96-
:::image type="content" source="media/how-to-data-encryption-portal/9-mysql-compute-storage.jpeg" alt-text="Screenshot of the Compute + Storage page.":::
94+
:::image type="content" source="media/how-to-data-encryption-portal/9-mysql-compute-storage.jpeg" alt-text="Screenshot of the Compute + Storage page." lightbox="media/how-to-data-encryption-portal/9-mysql-compute-storage.jpeg":::
9795

9896
> [!IMPORTANT]
9997
> When trying to encrypt Azure Database for MySQL flexible server with a customer managed key that already has a replica(s), we recommend configuring the replica(s) as well by adding the managed identity and key.
10098
101-
## Next steps
99+
## Related content
102100

103101
- [Customer managed keys data encryption](concepts-customer-managed-key.md)
104-
105102
- [Data encryption with Azure CLI](how-to-data-encryption-cli.md)
106-
107-

0 commit comments

Comments
 (0)