You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-sql/database/transparent-data-encryption-byok-configure.md
+4-17Lines changed: 4 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ description: Learn how to configure an Azure SQL Database and Azure Synapse Anal
5
5
author: Pietervanhove
6
6
ms.author: pivanho
7
7
ms.reviewer: vanto, mathoma
8
-
ms.date: 03/05/2026
8
+
ms.date: 06/25/2025
9
9
ms.service: azure-sql
10
10
ms.subservice: security
11
11
ms.topic: how-to
@@ -43,7 +43,7 @@ This article applies to Azure SQL Database, Azure SQL Managed Instance, and Azur
43
43
- The expiration date (if set) must be a future date and time
44
44
- The key must be in the Enabled state
45
45
- Able to perform *get*, *wrap key*, *unwrap key* operations
46
-
- To use an Azure Managed HSM key, follow instructions to [create and activate a Managed HSM using Azure CLI](/azure/key-vault/managed-hsm/quick-create-cli)
46
+
- To use a Managed HSM key, follow instructions to [create and activate a Managed HSM using Azure CLI](/azure/key-vault/managed-hsm/quick-create-cli)
47
47
48
48
# [PowerShell](#tab/azure-powershell)
49
49
@@ -93,22 +93,9 @@ For adding permissions to your server on a Managed HSM, add the 'Managed HSM Cry
93
93
> The combined length for the key vault name and key name cannot exceed 94 characters.
94
94
95
95
> [!TIP]
96
-
> **Using versioned and versionless Azure Key Vaultkeys for TDE**
96
+
> An example KeyId from Azure Key Vault: `https://contosokeyvault.vault.azure.net/keys/Key1/<key-id>`
97
97
>
98
-
> When you set the TDE protector, you can reference an Azure Key Vault key using either a specific key version or a versionless key identifier.
99
-
>
100
-
> In both cases, Azure SQL Database always resolves and uses the latest enabled version of the key in Azure Key Vault or Azure Key Vault Managed HSM. Use versionless key identifiers to avoid embedding a specific key version in the TDE protector configuration.
101
-
>
102
-
> Versionless key identifiers are currently supported only for Azure SQL Database.
103
-
>
104
-
> Examples:
105
-
> - Key identifier that includes a specific version
Copy file name to clipboardExpand all lines: azure-sql/database/transparent-data-encryption-byok-create-server.md
+2-20Lines changed: 2 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ description: Learn how to configure user-assigned managed identity and customer-
5
5
author: Pietervanhove
6
6
ms.author: pivanho
7
7
ms.reviewer: vanto, mathoma
8
-
ms.date: 03/05/2026
8
+
ms.date: 01/23/2026
9
9
ms.service: azure-sql-database
10
10
ms.subservice: security
11
11
ms.topic: how-to
@@ -85,24 +85,6 @@ This how-to guide outlines the steps to create an [Azure SQL Database logical se
85
85
1. On the **Security** tab, under **Transparent Data Encryption Key Management**, you have the option to configure transparent data encryption for the server or database.
86
86
- For **Server level key**: Select **Configure transparent data encryption**. Select **Customer-Managed Key**, and an option to select **Select a key** will appear. Select **Change key**. Select the desired **Subscription**, **Key vault**, **Key**, and **Version** for the customer-managed key to be used for TDE. Select the **Select** button.
87
87
88
-
> [!TIP]
89
-
> **Using versioned and versionless Azure Key Vault keys for TDE**
90
-
>
91
-
> When you set the TDE protector, you can reference an Azure Key Vault key using either a specific key version or a versionless key identifier.
92
-
>
93
-
> In both cases, Azure SQL Database always resolves and uses the latest enabled version of the key in Azure Key Vault or Azure Key Vault Managed HSM. Use versionless key identifiers to avoid embedding a specific key version in the TDE protector configuration.
94
-
>
95
-
> Versionless key identifiers are currently supported only for Azure SQL Database.
96
-
>
97
-
> Examples:
98
-
> - Key identifier that includes a specific version
:::image type="content" source="media/transparent-data-encryption-byok-create-server/configure-tde-for-server.png" alt-text="Screenshot of configuring TDE for the server in Azure SQL.":::
107
89
108
90
:::image type="content" source="media/transparent-data-encryption-byok-create-server/select-key-for-tde.png" alt-text="Screenshot selecting key for use with TDE.":::
@@ -123,7 +105,7 @@ This how-to guide outlines the steps to create an [Azure SQL Database logical se
123
105
124
106
1. On the **Review + create** page, after reviewing, select **Create**.
125
107
126
-
# [Azure CLI](#tab/azure-cli)
108
+
# [The Azure CLI](#tab/azure-cli)
127
109
128
110
For information on installing the current release of Azure CLI, see [Install the Azure CLI](/cli/azure/install-azure-cli) article.
Copy file name to clipboardExpand all lines: azure-sql/database/transparent-data-encryption-byok-key-rotation.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ description: Learn how to rotate the Transparent data encryption (TDE) protector
5
5
author: Pietervanhove
6
6
ms.author: pivanho
7
7
ms.reviewer: wiassaf, vanto, mathoma
8
-
ms.date: 03/05/2026
8
+
ms.date: 06/25/2025
9
9
ms.service: azure-sql
10
10
ms.subservice: security
11
11
ms.topic: how-to
@@ -52,7 +52,7 @@ Go to the [Azure portal](https://portal.azure.com)
52
52
53
53
For Az PowerShell module installation instructions, see [Install Azure PowerShell](/powershell/azure/install-az-ps). Use [the new Azure PowerShell Az module](/powershell/azure/new-azureps-module-az).
54
54
55
-
# [Azure CLI](#tab/azure-cli)
55
+
# [The Azure CLI](#tab/azure-cli)
56
56
57
57
For installation, see [Install the Azure CLI](/cli/azure/install-azure-cli).
To enable automatic rotation for the TDE protector at the database level using the Azure CLI, see the following command. Use the `--encryption-protector-auto-rotation` parameter and set to `True` to enable automatic key rotation or `False` to disable automatic key rotation.
158
158
@@ -234,7 +234,7 @@ The `<keyVaultKeyId>` can be [retrieved from Azure Key Vault](/azure/key-vault/k
234
234
235
235
### <aid="using-different-keys-for-each-server"></a> Use different keys for each server
236
236
237
-
It's possible to configure the primary and secondary servers with a different key vault key when configuring TDE with CMK in the Azure portal. It's not evident in the Azure portal that the key used to protect the primary server is also the same key that protects the primary database that has been replicated to the secondary server. However, you can use PowerShell, Azure CLI, or REST APIs to obtain details about keys that are used on the server. This shows that auto rotated keys are transferred from the primary server to the secondary server.
237
+
It's possible to configure the primary and secondary servers with a different key vault key when configuring TDE with CMK in the Azure portal. It's not evident in the Azure portal that the key used to protect the primary server is also the same key that protects the primary database that has been replicated to the secondary server. However, you can use PowerShell, the Azure CLI, or REST APIs to obtain details about keys that are used on the server. This shows that auto rotated keys are transferred from the primary server to the secondary server.
238
238
239
239
Here's an example of using PowerShell commands to check for keys that are transferred from the primary server to the secondary server after key rotation.
@@ -219,24 +219,6 @@ Auditors can use Azure Monitor to review managed HSM AuditEvent logs, if logging
219
219
220
220
- To remove a potentially compromised key during a security incident without the risk of data loss, follow the steps in the article [Remove a Transparent Data Encryption (TDE) protector using PowerShell](transparent-data-encryption-byok-remove-tde-protector.md).
221
221
222
-
> [!TIP]
223
-
> **Using versioned and versionless Azure Key Vault keys for TDE**
224
-
>
225
-
> When you set the TDE protector, you can reference an Azure Key Vault key using either a specific key version or a versionless key identifier.
226
-
>
227
-
> In both cases, Azure SQL Database always resolves and uses the latest enabled version of the key in Azure Key Vault or Azure Key Vault Managed HSM. Use versionless key identifiers to avoid embedding a specific key version in the TDE protector configuration.
228
-
>
229
-
> Versionless key identifiers are currently supported only for Azure SQL Database.
230
-
>
231
-
> Examples:
232
-
> - Key identifier that includes a specific version
Rotating the TDE protector for a server means to switch to a new asymmetric key that protects the databases on the server. Key rotation is an online operation and should only take a few seconds to complete. The operation only decrypts and re-encrypts the database encryption key, not the entire database.
description: Learn how to respond to a potentially compromised TDE protector for Azure SQL Database or Azure Synapse Analytics using TDE with Bring Your Own Key (BYOK) support.
5
5
author: Pietervanhove
6
6
ms.author: pivanho
7
7
ms.reviewer: wiassaf, vanto, mathoma
8
-
ms.date: 03/05/2026
8
+
ms.date: 06/25/2025
9
9
ms.service: azure-sql-database
10
10
ms.subservice: security
11
11
ms.topic: how-to
@@ -43,9 +43,9 @@ This how-to guide goes over the approach to render databases **inaccessible** af
43
43
44
44
For Az module installation instructions, see [Install Azure PowerShell](/powershell/azure/install-az-ps). Use [the new Azure PowerShell Az module](/powershell/azure/new-azureps-module-az).
45
45
46
-
# [Azure CLI](#tab/azure-cli)
46
+
# [The Azure CLI](#tab/azure-cli)
47
47
48
-
For installation, see [Install Azure CLI](/cli/azure/install-azure-cli).
48
+
For installation, see [Install the Azure CLI](/cli/azure/install-azure-cli).
49
49
50
50
* * *
51
51
@@ -68,13 +68,13 @@ The following query returns the VLFs and the TDE Protector respective thumbprint
68
68
SELECT*FROMsys.dm_db_log_info (database_id)
69
69
```
70
70
71
-
Alternatively, you can use PowerShell or Azure CLI:
71
+
Alternatively, you can use PowerShell or the Azure CLI:
72
72
73
73
# [PowerShell](#tab/azure-powershell)
74
74
75
75
The PowerShell command `Get-AzSqlServerKeyVaultKey` provides the thumbprint of the TDE Protector used in the query, so you can see which keys to keep and which keys to delete in Azure Key Vault. Only keys no longer used by the database can be safely deleted from Azure Key Vault.
76
76
77
-
# [Azure CLI](#tab/azure-cli)
77
+
# [The Azure CLI](#tab/azure-cli)
78
78
79
79
The PowerShell command `az sql server key show` provides the thumbprint of the TDE Protector used in the query, so you can see which keys to keep and which keys to delete in Azure Key Vault. Only keys no longer used by the database can be safely deleted from Azure Key Vault.
80
80
@@ -125,9 +125,9 @@ The PowerShell command `az sql server key show` provides the thumbprint of the
For command reference, see [Azure CLI keyvault](/cli/azure/keyvault/key).
130
+
For command reference, see the [Azure CLI keyvault](/cli/azure/keyvault/key).
131
131
132
132
1. Create a [new key in Azure Key Vault](/cli/azure/keyvault/key#az-keyvault-key-create). Make sure this new key is created in a separate key vault from the potentially compromised TDE protector, since access control is provisioned on a vault level.
0 commit comments