Skip to content

Commit eb0230b

Browse files
committed
Learn Editor: Update how-to-data-encryption-portal.md
1 parent d366c46 commit eb0230b

File tree

1 file changed

+7
-0
lines changed

1 file changed

+7
-0
lines changed

articles/mysql/flexible-server/how-to-data-encryption-portal.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,11 @@ In this tutorial, you learn how to:
2222
- Configure data encryption for restoration.
2323
- Configure data encryption for replica servers.
2424

25+
> [!NOTE]
26+
> Azure key vault access configuration now supports two types of permission models - [Azure role-based access control](../../role-based-access-control/overview.md) and [Vault access policy](../../key-vault/general/assign-access-policy.md). The tutorial describes configuring data encryption for Azure Database for MySQL - Flexible server using Vault access policy. However, you can choose to use Azure RBAC as permission model to grant access to Azure Key Vault. To do so, you need any built-in or custom role that has below three permissions and assign it through "role assignments" using Access control (IAM) tab in the keyvault: a) KeyVault/vaults/keys/wrap/action b) KeyVault/vaults/keys/unwrap/action c) KeyVault/vaults/keys/read
27+
28+
role-based-access-control/overview
29+
2530
## Prerequisites
2631

2732
- An Azure account with an active subscription.
@@ -97,3 +102,5 @@ After your Azure Database for MySQL - Flexible Server is encrypted with a custom
97102

98103
- [Customer managed keys data encryption](concepts-customer-managed-key.md)
99104
- [Data encryption with Azure CLI](how-to-data-encryption-cli.md)
105+
106+

0 commit comments

Comments
 (0)