Skip to content

Commit f9c257c

Browse files
committed
changed the bullet points to use nest 1s and updated toc.yml
1 parent 9736d77 commit f9c257c

File tree

2 files changed

+7
-7
lines changed

2 files changed

+7
-7
lines changed

articles/cosmos-db/postgresql/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -202,7 +202,7 @@
202202
href: howto-private-access.md
203203
displayName: network, private link
204204
- name: Customer managed keys
205-
href: howto-customer-managed-keys.md
205+
href: how-to-customer-managed-keys.md
206206
displayName: customer-managed, keys, cmk
207207
- name: Configure SSL
208208
href: howto-ssl-connection-security.md

articles/cosmos-db/postgresql/how-to-customer-managed-keys.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ ms.date: 04/06/2023
3434

3535
## Detailed steps
3636

37-
### 1. User Assigned Managed Identity:
37+
1. ### User Assigned Managed Identity:
3838

3939
1. Search for Managed Identities in the global search bar.
4040

@@ -48,7 +48,7 @@ ms.date: 04/06/2023
4848

4949
Learn more about [User Assigned Managed Identity.](../../active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md?pivots=identity-mi-methods-azp#create-a-user-assigned-managed-identity).
5050

51-
### 1. Key Vault:
51+
1. ### Key Vault:
5252

5353
Using customer-managed keys with Azure Cosmos DB for PostgreSQL requires you to set two properties on the Azure Key Vault instance that you plan to use to host your encryption keys: Soft Delete and Purge Protection.
5454

@@ -66,7 +66,7 @@ ms.date: 04/06/2023
6666
> [!IMPORTANT]
6767
> Your Azure Key Vault instance must be allow public access from all the networks.
6868
69-
### 1. Add an Access Policy to the Key Vault:
69+
1. ### Add an Access Policy to the Key Vault:
7070

7171
1. From the Azure portal, go to the Azure Key Vault instance that you plan to use to host your encryption keys. Select Access configuration from the left menu and then select Go to access policies.
7272

@@ -82,7 +82,7 @@ ms.date: 04/06/2023
8282

8383
1. Navigate to Review + create select Create.
8484

85-
### 1. Create / Import Key:
85+
1. ### Create / Import Key:
8686

8787
1. From the Azure portal, go to the Azure Key Vault instance that you plan to use to host your encryption keys.
8888

@@ -100,7 +100,7 @@ ms.date: 04/06/2023
100100

101101
1. If you're manually rotating the key, the old key version shouldn't be deleted for at least 24 hours.
102102

103-
### 1. Enable CMK encryption during the provisioning for a new cluster
103+
1. ### Enable CMK encryption during the provisioning for a new cluster
104104

105105
# [Portal](#tab/portal)
106106

@@ -235,7 +235,7 @@ ms.date: 04/06/2023
235235
```
236236
---
237237

238-
### 1. High Availability:
238+
### High Availability:
239239

240240
When CMK encryption is enabled on the primary cluster, all standby HA replicas are automatically encrypted by the primary cluster’s CMK
241241

0 commit comments

Comments
 (0)