You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/cosmos-db/postgresql/how-to-customer-managed-keys.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ ms.date: 04/06/2023
34
34
35
35
## Detailed steps
36
36
37
-
###1. User Assigned Managed Identity:
37
+
1.### User Assigned Managed Identity:
38
38
39
39
1. Search for Managed Identities in the global search bar.
40
40
@@ -48,7 +48,7 @@ ms.date: 04/06/2023
48
48
49
49
Learn more about [User Assigned Managed Identity.](../../active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md?pivots=identity-mi-methods-azp#create-a-user-assigned-managed-identity).
50
50
51
-
###1. Key Vault:
51
+
1.### Key Vault:
52
52
53
53
Using customer-managed keys with Azure Cosmos DB for PostgreSQL requires you to set two properties on the Azure Key Vault instance that you plan to use to host your encryption keys: Soft Delete and Purge Protection.
54
54
@@ -66,7 +66,7 @@ ms.date: 04/06/2023
66
66
> [!IMPORTANT]
67
67
> Your Azure Key Vault instance must be allow public access from all the networks.
68
68
69
-
###1. Add an Access Policy to the Key Vault:
69
+
1.### Add an Access Policy to the Key Vault:
70
70
71
71
1. From the Azure portal, go to the Azure Key Vault instance that you plan to use to host your encryption keys. Select Access configuration from the left menu and then select Go to access policies.
72
72
@@ -82,7 +82,7 @@ ms.date: 04/06/2023
82
82
83
83
1. Navigate to Review + create select Create.
84
84
85
-
###1. Create / Import Key:
85
+
1.### Create / Import Key:
86
86
87
87
1. From the Azure portal, go to the Azure Key Vault instance that you plan to use to host your encryption keys.
88
88
@@ -100,7 +100,7 @@ ms.date: 04/06/2023
100
100
101
101
1. If you're manually rotating the key, the old key version shouldn't be deleted for at least 24 hours.
102
102
103
-
###1. Enable CMK encryption during the provisioning for a new cluster
103
+
1.### Enable CMK encryption during the provisioning for a new cluster
104
104
105
105
# [Portal](#tab/portal)
106
106
@@ -235,7 +235,7 @@ ms.date: 04/06/2023
235
235
```
236
236
---
237
237
238
-
### 1. High Availability:
238
+
### High Availability:
239
239
240
240
When CMK encryption is enabled on the primary cluster, all standby HA replicas are automatically encrypted by the primary cluster’s CMK
0 commit comments