Skip to content

Commit 2ab5bd9

Browse files
committed
Merge branch 'main' into release-ssms-migrate-old
2 parents 3d735e8 + 1559274 commit 2ab5bd9

File tree

8 files changed

+200
-166
lines changed

8 files changed

+200
-166
lines changed
Loading

azure-sql/database/monitoring-with-dmvs.md

Lines changed: 79 additions & 74 deletions
Large diffs are not rendered by default.

azure-sql/database/transparent-data-encryption-byok-identity.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Bring Your Own Key (BYOK) support for transparent data encryption (
55
author: GithubMirek
66
ms.author: mireks
77
ms.reviewer: vanto, mathoma
8-
ms.date: 09/28/2023
8+
ms.date: 02/12/2025
99
ms.service: azure-sql
1010
ms.subservice: security
1111
ms.topic: conceptual
@@ -33,7 +33,7 @@ In addition to the system-assigned managed identity that is already supported fo
3333
3434
## Benefits of using UMI for customer-managed TDE
3535

36-
- Enables the ability to pre-authorize key vault access for Azure SQL logical servers or managed instances by creating a user-assigned managed identity, and granting it access to key vault, even before the server or database has been created
36+
- Enables the ability to preauthorize key vault access for Azure SQL logical servers or managed instances by creating a user-assigned managed identity, and granting it access to key vault, even before the server or database has been created
3737

3838
- Allows creation of an Azure SQL logical server with TDE and CMK enabled
3939

@@ -50,14 +50,14 @@ In addition to the system-assigned managed identity that is already supported fo
5050
- To switch the server from user-assigned to system-assigned managed identity for key vault access, provide the system-assigned managed identity with the required key vault permissions, then remove all user-assigned managed identities from the server
5151

5252
> [!IMPORTANT]
53-
> The primary user-assigned managed identity being used for TDE with CMK should not be deleted from Azure. Deleting this identity will lead to the server losing access to key vault and databases becoming *inaccessible*.
53+
> The primary user-assigned managed identity being used for TDE with CMK shouldn't be deleted from Azure. Deleting this identity will lead to the server losing access to key vault and databases becoming *inaccessible*.
5454
5555
## Limitations and known issues
5656

57-
- If the key vault is behind a VNet that uses a firewall, the option to **Allow Trusted Microsoft Services to bypass this firewall** must be enabled in the key vault's **Networking** menu if you want to use a user-assigned managed identity or system-assigned managed identity. Once this option is enabled, available keys can't be listed in the SQL server TDE menu in the Azure portal. To set an individual CMK, a *key identifier* must be used. When the option to **Allow Trusted Microsoft Services to bypass this firewall** isn't enabled, the following error is returned:
57+
- If the key vault is behind a virtual network that uses a firewall, the option to **Allow Trusted Microsoft Services to bypass this firewall** must be enabled in the key vault's **Networking** menu if you want to use a user-assigned managed identity or system-assigned managed identity. Once this option is enabled, available keys can't be listed in the SQL server TDE menu in the Azure portal. To set an individual CMK, a *key identifier* must be used. When the option to **Allow Trusted Microsoft Services to bypass this firewall** isn't enabled, the following error is returned:
5858
- `Failed to save Transparent Data Encryption settings for SQL resource: <ServerName>. Error message: The managed identity with ID '/subscriptions/subscriptionID/resourcegroups/resource_name/providers/Microsoft.ManagedIdentity/userAssignedIdentities/umi_name' requires the following Azure Key Vault permissions: 'Get, WrapKey, UnwrapKey' to the key 'https://keyvault_name/keys/key_name'. Please grant the missing permissions to the identity. Additionally ensure the key is not expired and is not disabled. For expired key, please extend the key expiry time so that SQL can use it to perform wrap and unwrap operations. If your key vault is behind a virtual network or firewall, ensure you select the 'Allow trusted Microsoft services to bypass this firewall' option. (https://aka.ms/sqltdebyokcreateserver).`
5959
- If you get the above error, check if the key vault is behind a virtual network or firewall, and make sure the option **Allow Trusted Microsoft Services to bypass this firewall** is enabled.
60-
- User Assigned Managed Identity for SQL Managed Instances is currently only supported on key vaults that have public access from all networks enabled. It is not supported when the AKV firewall is filtering specific virtual networks and IP addresses or using private endpoint connections.
60+
- Enabling the **Allow Trusted Microsoft Services to bypass this firewall** option isn't required when using the **Private endpoint connections** configuration.
6161
- When multiple user-assigned managed identities are assigned to the server or managed instance, if a single identity is removed from the server using the *Identity* pane of the Azure portal, the operation succeeds but the identity doesn't get removed from the server. Removing all user-assigned managed identities together from the Azure portal works successfully.
6262
- When the server or managed instance is configured with customer-managed TDE and both system-assigned and user-assigned managed identities are enabled on the server, removing the user-assigned managed identities from the server without first giving the system-assigned managed identity access to the key vault results in an *Unexpected error occurred* message. Ensure the system-assigned managed identity has been provided key vault access prior to removing the primary user-assigned managed identity (and any other user-assigned managed identities) from the server.
6363

@@ -66,6 +66,6 @@ In addition to the system-assigned managed identity that is already supported fo
6666
> [!div class="nextstepaction"]
6767
> [Create Azure SQL database configured with user-assigned managed identity and customer-managed TDE](transparent-data-encryption-byok-create-server.md)
6868
69-
## See also
69+
## Related content
7070

7171
- [Create an Azure SQL Managed Instance with a user-assigned managed identity](../managed-instance/authentication-azure-ad-user-assigned-managed-identity-create-managed-instance.md)
Loading

0 commit comments

Comments
 (0)