You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This tutorial shows you how to set up and manage data encryption for Azure Database for MySQL flexible server.
18
18
@@ -25,8 +25,6 @@ In this tutorial, you learn how to:
25
25
> [!NOTE]
26
26
> Azure key vault access configuration now supports two types of permission models - [Azure role-based access control](../../role-based-access-control/overview.md) and [Vault access policy](../../key-vault/general/assign-access-policy.md). The tutorial describes configuring data encryption for Azure Database for MySQL flexible server using Vault access policy. However, you can choose to use Azure RBAC as permission model to grant access to Azure Key Vault. To do so, you need any built-in or custom role that has below three permissions and assign it through "role assignments" using Access control (IAM) tab in the keyvault: a) KeyVault/vaults/keys/wrap/action b) KeyVault/vaults/keys/unwrap/action c) KeyVault/vaults/keys/read. For Azure key vault managed HSM, you will also need to assign the "Managed HSM Crypto Service Encryption User" role assignment in RBAC.
27
27
28
-
29
-
30
28
## Prerequisites
31
29
32
30
- An Azure account with an active subscription.
@@ -39,13 +37,13 @@ In this tutorial, you learn how to:
39
37
40
38
1. In Key Vault, select **Access policies**, and then select **Create**.
41
39
42
-
:::image type="content" source="media/how-to-data-encryption-portal/1-mysql-key-vault-access-policy.jpeg" alt-text="Screenshot of Key Vault Access Policy in the Azure portal.":::
40
+
:::image type="content" source="media/how-to-data-encryption-portal/1-mysql-key-vault-access-policy.jpeg" alt-text="Screenshot of Key Vault Access Policy in the Azure portal." lightbox="media/how-to-data-encryption-portal/1-mysql-key-vault-access-policy.jpeg":::
43
41
44
42
1. On the **Permissions** tab, select the following **Key permissions - Get** , **List** , **Wrap Key** , **Unwrap Key**.
45
43
46
44
1. On the **Principal** tab, select the User-assigned Managed Identity.
47
45
48
-
:::image type="content" source="media/how-to-data-encryption-portal/2-mysql-principal-tab.jpeg" alt-text="Screenshot of the principal tab in the Azure portal.":::
46
+
:::image type="content" source="media/how-to-data-encryption-portal/2-mysql-principal-tab.jpeg" alt-text="Screenshot of the principal tab in the Azure portal." lightbox="media/how-to-data-encryption-portal/2-mysql-principal-tab.jpeg":::
49
47
50
48
1. Select **Create**.
51
49
@@ -55,17 +53,17 @@ To set up the customer managed key, perform the following steps.
55
53
56
54
1. In the portal, navigate to your Azure Database for MySQL flexible server instance, and then, under **Security** , select **Data encryption**.
57
55
58
-
:::image type="content" source="media/how-to-data-encryption-portal/3-mysql-data-encryption.jpeg" alt-text="Screenshot of the data encryption page.":::
56
+
:::image type="content" source="media/how-to-data-encryption-portal/3-mysql-data-encryption.jpeg" alt-text="Screenshot of the data encryption page." lightbox="media/how-to-data-encryption-portal/3-mysql-data-encryption.jpeg":::
59
57
60
58
1. On the **Data encryption** page, under **No identity assigned** , select **Change identity** ,
61
59
62
60
1. In the **Select user assigned**** managed identity **dialog box, select the** demo-umi **identity, and then select** Add**.
63
61
64
-
:::image type="content" source="media/how-to-data-encryption-portal/4-mysql-assigned-managed-identity-demo-uni.jpeg" alt-text="Screenshot of selecting the demo-umi from the assigned managed identity page.":::
62
+
:::image type="content" source="media/how-to-data-encryption-portal/4-mysql-assigned-managed-identity-demo-uni.jpeg" alt-text="Screenshot of selecting the demo-umi from the assigned managed identity page." lightbox="media/how-to-data-encryption-portal/4-mysql-assigned-managed-identity-demo-uni.jpeg":::
65
63
66
64
1. To the right of **Key selection method** , either **Select a key** and specify a key vault and key pair, or select **Enter a key identifier**.
67
65
68
-
:::image type="content" source="media/how-to-data-encryption-portal/5-mysql-select-key.jpeg" alt-text="Screenshot of the Select Key page in the Azure portal.":::
66
+
:::image type="content" source="media/how-to-data-encryption-portal/5-mysql-configure-encryption-marked.png" alt-text="Screenshot of key selection method to show user." lightbox="media/how-to-data-encryption-portal/5-mysql-configure-encryption-marked.png":::
69
67
70
68
1. Select **Save**.
71
69
@@ -76,32 +74,29 @@ To use data encryption as part of a restore operation, perform the following ste
76
74
1. In the Azure portal, on the navigate Overview page for your server, select **Restore**.
77
75
1. On the **Security** tab, you specify the identity and the key.
78
76
79
-
:::image type="content" source="media/how-to-data-encryption-portal/6-mysql-navigate-overview-page.jpeg" alt-text="Screenshot of overview page.":::
77
+
:::image type="content" source="media/how-to-data-encryption-portal/6-mysql-navigate-overview-page.jpeg" alt-text="Screenshot of overview page." lightbox="media/how-to-data-encryption-portal/6-mysql-navigate-overview-page.jpeg":::
80
78
81
79
1. Select **Change identity** and select the **User assigned managed identity** and select on **Add**
82
80
**To select the Key** , you can either select a **key vault** and **key pair** or enter a **key identifier**
83
81
84
-
:::image type="content" source="media/how-to-data-encryption-portal/7-mysql-change-identity.jpeg" alt-text="SCreenshot of the change identity page.":::
82
+
:::image type="content" source="media/how-to-data-encryption-portal/7-mysql-change-identity.jpeg" alt-text="SCreenshot of the change identity page." lightbox="media/how-to-data-encryption-portal/7-mysql-change-identity.jpeg":::
85
83
86
84
## Use Data encryption for replica servers
87
85
88
86
After your Azure Database for MySQL flexible server instance is encrypted with a customer's managed key stored in Key Vault, any newly created copy of the server is also encrypted.
89
87
90
88
1. To configuration replication, under **Settings** , select **Replication** , and then select **Add replica**.
91
89
92
-
:::image type="content" source="media/how-to-data-encryption-portal/8-mysql-replication.jpeg" alt-text="Screenshot of the Replication page.":::
90
+
:::image type="content" source="media/how-to-data-encryption-portal/8-mysql-replication.jpeg" alt-text="Screenshot of the Replication page." lightbox="media/how-to-data-encryption-portal/8-mysql-replication.jpeg":::
93
91
94
92
1. In the Add Replica server to Azure Database for MySQL dialog box, select the appropriate **Compute + storage** option, and then select **OK**.
95
93
96
-
:::image type="content" source="media/how-to-data-encryption-portal/9-mysql-compute-storage.jpeg" alt-text="Screenshot of the Compute + Storage page.":::
94
+
:::image type="content" source="media/how-to-data-encryption-portal/9-mysql-compute-storage.jpeg" alt-text="Screenshot of the Compute + Storage page." lightbox="media/how-to-data-encryption-portal/9-mysql-compute-storage.jpeg":::
97
95
98
96
> [!IMPORTANT]
99
97
> When trying to encrypt Azure Database for MySQL flexible server with a customer managed key that already has a replica(s), we recommend configuring the replica(s) as well by adding the managed identity and key.
100
98
101
-
## Next steps
99
+
## Related content
102
100
103
101
-[Customer managed keys data encryption](concepts-customer-managed-key.md)
104
-
105
102
-[Data encryption with Azure CLI](how-to-data-encryption-cli.md)
0 commit comments