Skip to content

Commit fa58ee2

Browse files
authored
Merge pull request #115159 from djpmsft/docUpdates
fixing toc for cmk
2 parents 35687b8 + c0e062d commit fa58ee2

File tree

2 files changed

+11
-11
lines changed

2 files changed

+11
-11
lines changed

articles/data-factory/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,6 @@
2525
href: quickstart-create-data-factory-rest-api.md
2626
- name: Create data factory - Resource Manager template
2727
href: quickstart-create-data-factory-resource-manager-template.md
28-
- name: Security - Enable Customer Managed Key Encryption
29-
href: quickstart-enable-customer-managed-key.md
3028
- name: Create data flow
3129
href: data-flow-create.md
3230
- name: Tutorials
@@ -555,6 +553,8 @@
555553
href: encrypt-credentials-self-hosted-integration-runtime.md
556554
- name: Managed identity for Data Factory
557555
href: data-factory-service-identity.md
556+
- name: Customer managed key encryption
557+
href: quickstart-enable-customer-managed-key.md
558558
- name: Monitor and manage
559559
items:
560560
- name: Monitor visually

articles/data-factory/quickstart-enable-customer-managed-key.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.date: 05/08/2020
1111
ms.author: chez
1212
ms.reviewer: mariozi
1313
---
14-
# Enhance Data Factory Security and Configure customer-managed keys with Azure Key Vault
14+
# Encrypt Azure Data Factory with customer-managed keys
1515

1616
[!INCLUDE[appliesto-adf-xxx-md](includes/appliesto-adf-xxx-md.md)]
1717

@@ -20,9 +20,9 @@ Azure Data Factory encrypts data at rest, including entity definitions, any data
2020
Azure Key Vault is required to store customer-managed keys. You can either create your own keys and store them in a key vault, or you can use the Azure Key Vault APIs to generate keys. Key vault and Data Factory must be in the same Azure Active Directory (Azure AD) tenant and in the same region, but they may be in different subscriptions. For more information about Azure Key Vault, see [What is Azure Key Vault?](../key-vault/general/overview.md)
2121

2222
> [!NOTE]
23-
> For now, customer-managed key can only be configured on an empty Data Factory: no linked service, no pipeline, no data sets, nothing. Consider enable customer-managed key right after factory creation.
23+
> A customer-managed key can only be configured on an empty data Factory. The data factory can't contain any resources such as linked services, pipelines and data flows. It is recommended to enable customer-managed key right after factory creation.
2424
25-
## About Customer-Managed Keys
25+
## About customer-managed keys
2626

2727
The following diagram shows how Data Factory uses Azure Active Directory and Azure Key Vault to make requests using the customer-managed key:
2828

@@ -36,7 +36,7 @@ The following list explains the numbered steps in the diagram:
3636
1. Data Factory wraps the factory encryption key with the customer key in Azure Key Vault
3737
1. For read/write operations, Data Factory sends requests to Azure Key Vault to unwrap the account encryption key to perform encryption and decryption operations
3838

39-
## Prerequisites - Configure Azure Key Vault and Generate Keys
39+
## Prerequisites - configure Azure Key Vault and generate keys
4040

4141
### Enable Soft Delete and Do Not Purge on Azure Key Vault
4242

@@ -49,21 +49,21 @@ If you are creating a new Azure Key Vault through Azure portal, __Soft Delete__
4949

5050
![Screenshot Enable Soft Delete and Purge Protection upon creation of Key Vault](media/quickstart-enable-customer-managed-key/01-enable-purge-protection.png)
5151

52-
### Grant Data Factory Access to Key Vault
52+
### Grant Data Factory access to Azure Key Vault
5353

5454
Make sure that Azure Key Vault and Azure Data Factory are in the same Azure Active Directory (Azure AD) tenant and in the _same region_. From Azure Key Vault access control, grant data factory's Managed Service Identity (MSI) following permissions: _Get_, _Unwrap Key_, and _Wrap Key_. These permissions are required to enable customer-managed keys in Data Factory.
5555

5656
![Screenshot Enable Data Factory Access to Key Vault](media/quickstart-enable-customer-managed-key/02-access-policy-factory-msi.png)
5757

58-
### Generate or Upload customer-managed key to Key Vault
58+
### Generate or upload customer-managed key to Azure Key Vault
5959

6060
You can either create your own keys and store them in a key vault, or you can use the Azure Key Vault APIs to generate keys. Only 2048-bit RSA keys are supported with Data Factory encryption. For more information, see [About keys, secrets, and certificates](../key-vault/general/about-keys-secrets-certificates.md).
6161

6262
![Screenshot Generate Customer Managed Key](media/quickstart-enable-customer-managed-key/03-create-key.png)
6363

64-
## Enable Customer-Managed Keys
64+
## Enable customer-managed keys
6565

66-
1. Ensure the Data Factory is empty: no linked service, no pipeline, and no data set, nothing. For now, deploying customer-managed key to a non-empty factory will result in an error.
66+
1. Ensure the Data Factory is empty. The data factory can't contain any resources such as linked services, pipelines and data flows. For now, deploying customer-managed key to a non-empty factory will result in an error.
6767

6868
1. To locate the key URI in the Azure portal, navigate to Azure Key Vault, and select the Keys setting. Select the wanted key, then click the key to view its versions. Select a key version to view the settings
6969

@@ -107,7 +107,7 @@ To change key used for Data Factory encryption, you have to manually update the
107107

108108
## Disable Customer-Managed Keys
109109

110-
By design, once customer-managed key feature is enabled, you cannot remove the extra security step. We will always expect a customer provided key to encrypt factory and data.
110+
By design, once the customer-managed key feature is enabled, you can't remove the extra security step. We will always expect a customer provided key to encrypt factory and data.
111111

112112
## Next steps
113113

0 commit comments

Comments
 (0)