You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|Microsoft managed keys (MMK) | In most cache sizes. Disk encryption isn't supported for Basic and Standard sizes C0 and C1. | Yes |
22
+
|Customer managed keys (CMK) | No | Yes |
27
23
28
24
> [!WARNING]
29
-
> By default, all Azure Cache for Redis tiers use Microsoft managed keys to encrypt disks mounted to cache instances. However, in the Basic and Standard tiers, the C0 and C1 SKUs do not support any disk encryption.
25
+
> By default, all Azure Cache for Redis tiers use Microsoft managed keys to encrypt disks mounted to cache instances. However, in the Basic and Standard tiers, the C0 and C1 SKUs don't support any disk encryption.
30
26
>
31
27
32
28
> [!IMPORTANT]
@@ -47,22 +43,22 @@ MMK is used to encrypt these disks by default, but CMK can also be used.
47
43
48
44
In the **Enterprise Flash** tier, keys and values are also partially stored on-disk using nonvolatile memory express (NVMe) flash storage. However, this disk isn't the same as the one used for persisted data. Instead, it's ephemeral, and data isn't persisted after the cache is stopped, deallocated, or rebooted. MMK is only supported on this disk because this data is transient and ephemeral.
In the **Basic, Standard, and Premium** tiers, the OS disk is encrypted by default using MMK. There's no persistence disk mounted and Azure Storage is used instead. The C0 and C1 SKUs do not use disk encryption.
54
+
In the **Basic, Standard, and Premium** tiers, the OS disk is encrypted by default using MMK. There's no persistence disk mounted and Azure Storage is used instead. The C0 and C1 SKUs don't use disk encryption.
59
55
60
56
## Prerequisites and limitations
61
57
62
58
### General prerequisites and limitations
63
59
64
60
- Disk encryption isn't available in the Basic and Standard tiers for the C0 or C1 SKUs
65
-
- Only user assigned managed identity is supported to connect to Azure Key Vault. System assigned managed identity is not supported.
61
+
- Only user assigned managed identity is supported to connect to Azure Key Vault. System assigned managed identity isn't supported.
66
62
- Changing between MMK and CMK on an existing cache instance triggers a long-running maintenance operation. We don't recommend this for production use because a service disruption occurs.
67
63
68
64
### Azure Key Vault prerequisites and limitations
@@ -100,13 +96,13 @@ In the **Basic, Standard, and Premium** tiers, the OS disk is encrypted by defau
100
96
101
97
1. If using the **URI** input method, enter the Key Identifier URI for your chosen key from Azure Key Vault.
102
98
103
-
1. When you've entered all the information for your cache, select **Review + create**.
99
+
1. When you enter all the information for your cache, select **Review + create**.
104
100
105
101
### Add CMK encryption to an existing Enterprise cache
106
102
107
103
1. Go to the **Encryption** in the Resource menu of your cache instance. If CMK is already set up, you see the key information.
108
104
109
-
1. If you haven't set up or if you want to change CMK settings, select **Change encryption settings**
105
+
1. If you haven't set up CMK or want to change CMK settings, select **Change encryption settings**.
110
106
:::image type="content" source="media/cache-how-to-encryption/cache-encryption-existing-use.png" alt-text="Screenshot encryption selected in the Resource menu for an Enterprise tier cache.":::
111
107
112
108
1. Select **Use a customer-managed key** to see your configuration options.
@@ -133,3 +129,4 @@ Learn more about Azure Cache for Redis features:
0 commit comments