Skip to content

Commit e8a54a6

Browse files
committed
Add more desc for assign MI section
1 parent 98534d0 commit e8a54a6

File tree

1 file changed

+4
-0
lines changed

1 file changed

+4
-0
lines changed

articles/cosmos-db/how-to-setup-customer-managed-keys.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -715,6 +715,10 @@ The only operation possible when the encryption key has been revoked is account
715715
716716
### Assign a new managed-identity to the restored database account to continue accessing or recover access to the database account
717717
718+
User-Assigned Identity is tied to a specified Cosmos DB account, whenever we assign a User-Assigned Identity to an account, ARM forwards the request to managed service identities to make this connection. Currently we carry over user-identity information from the source database account to the target database account during the restore (for both Continuous and Periodic backup restore) of CMK + User-Assigned Identity,
719+
720+
Since the identity metadata is bound with the source database account and restore workflow doesn't re-scope identity to the target database account. This will cause the restored database accounts to be in a bad state, and become inaccessible after the source account is deleted and identity’s renew time is expired.
721+
718722
Steps to assign a new managed-identity:
719723
1. [Create a new user-assigned managed identity.](../active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md#create-a-user-assigned-managed-identity)
720724
2. [Grant KeyVault key access to this identity.](#choosing-the-preferred-security-model)

0 commit comments

Comments
 (0)