Skip to content

Commit 999e2f7

Browse files
authored
Revert "Versionless keys (#36774)" (#36791)
This reverts commit 5e8b6b0.
1 parent 7e30e10 commit 999e2f7

5 files changed

Lines changed: 22 additions & 71 deletions

azure-sql/database/transparent-data-encryption-byok-configure.md

Lines changed: 4 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn how to configure an Azure SQL Database and Azure Synapse Anal
55
author: Pietervanhove
66
ms.author: pivanho
77
ms.reviewer: vanto, mathoma
8-
ms.date: 03/05/2026
8+
ms.date: 06/25/2025
99
ms.service: azure-sql
1010
ms.subservice: security
1111
ms.topic: how-to
@@ -43,7 +43,7 @@ This article applies to Azure SQL Database, Azure SQL Managed Instance, and Azur
4343
- The expiration date (if set) must be a future date and time
4444
- The key must be in the Enabled state
4545
- Able to perform *get*, *wrap key*, *unwrap key* operations
46-
- To use an Azure Managed HSM key, follow instructions to [create and activate a Managed HSM using Azure CLI](/azure/key-vault/managed-hsm/quick-create-cli)
46+
- To use a Managed HSM key, follow instructions to [create and activate a Managed HSM using Azure CLI](/azure/key-vault/managed-hsm/quick-create-cli)
4747

4848
# [PowerShell](#tab/azure-powershell)
4949

@@ -93,22 +93,9 @@ For adding permissions to your server on a Managed HSM, add the 'Managed HSM Cry
9393
> The combined length for the key vault name and key name cannot exceed 94 characters.
9494
9595
> [!TIP]
96-
> **Using versioned and versionless Azure Key Vault keys for TDE**
96+
> An example KeyId from Azure Key Vault: `https://contosokeyvault.vault.azure.net/keys/Key1/<key-id>`
9797
>
98-
> When you set the TDE protector, you can reference an Azure Key Vault key using either a specific key version or a versionless key identifier.
99-
>
100-
> In both cases, Azure SQL Database always resolves and uses the latest enabled version of the key in Azure Key Vault or Azure Key Vault Managed HSM. Use versionless key identifiers to avoid embedding a specific key version in the TDE protector configuration.
101-
>
102-
> Versionless key identifiers are currently supported only for Azure SQL Database.
103-
>
104-
> Examples:
105-
> - Key identifier that includes a specific version
106-
>
107-
> `https://<key-vault-name>.vault.azure.net/keys/<key-name>/<key-version>`
108-
>
109-
> - Versionless key identifier
110-
>
111-
> `https://<key-vault-name>.vault.azure.net/keys/<key-name>`
98+
> An example KeyId from Managed HSM:<br/>https://contosoMHSM.managedhsm.azure.net/keys/myrsakey
11299
113100
```powershell
114101
# add the key from Azure Key Vault to the server

azure-sql/database/transparent-data-encryption-byok-create-server.md

Lines changed: 2 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn how to configure user-assigned managed identity and customer-
55
author: Pietervanhove
66
ms.author: pivanho
77
ms.reviewer: vanto, mathoma
8-
ms.date: 03/05/2026
8+
ms.date: 01/23/2026
99
ms.service: azure-sql-database
1010
ms.subservice: security
1111
ms.topic: how-to
@@ -85,24 +85,6 @@ This how-to guide outlines the steps to create an [Azure SQL Database logical se
8585
1. On the **Security** tab, under **Transparent Data Encryption Key Management**, you have the option to configure transparent data encryption for the server or database.
8686
- For **Server level key**: Select **Configure transparent data encryption**. Select **Customer-Managed Key**, and an option to select **Select a key** will appear. Select **Change key**. Select the desired **Subscription**, **Key vault**, **Key**, and **Version** for the customer-managed key to be used for TDE. Select the **Select** button.
8787

88-
> [!TIP]
89-
> **Using versioned and versionless Azure Key Vault keys for TDE**
90-
>
91-
> When you set the TDE protector, you can reference an Azure Key Vault key using either a specific key version or a versionless key identifier.
92-
>
93-
> In both cases, Azure SQL Database always resolves and uses the latest enabled version of the key in Azure Key Vault or Azure Key Vault Managed HSM. Use versionless key identifiers to avoid embedding a specific key version in the TDE protector configuration.
94-
>
95-
> Versionless key identifiers are currently supported only for Azure SQL Database.
96-
>
97-
> Examples:
98-
> - Key identifier that includes a specific version
99-
>
100-
> `https://<key-vault-name>.vault.azure.net/keys/<key-name>/<key-version>`
101-
>
102-
> - Versionless key identifier
103-
>
104-
> `https://<key-vault-name>.vault.azure.net/keys/<key-name>`
105-
10688
:::image type="content" source="media/transparent-data-encryption-byok-create-server/configure-tde-for-server.png" alt-text="Screenshot of configuring TDE for the server in Azure SQL.":::
10789

10890
:::image type="content" source="media/transparent-data-encryption-byok-create-server/select-key-for-tde.png" alt-text="Screenshot selecting key for use with TDE.":::
@@ -123,7 +105,7 @@ This how-to guide outlines the steps to create an [Azure SQL Database logical se
123105

124106
1. On the **Review + create** page, after reviewing, select **Create**.
125107

126-
# [Azure CLI](#tab/azure-cli)
108+
# [The Azure CLI](#tab/azure-cli)
127109

128110
For information on installing the current release of Azure CLI, see [Install the Azure CLI](/cli/azure/install-azure-cli) article.
129111

azure-sql/database/transparent-data-encryption-byok-key-rotation.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Learn how to rotate the Transparent data encryption (TDE) protector
55
author: Pietervanhove
66
ms.author: pivanho
77
ms.reviewer: wiassaf, vanto, mathoma
8-
ms.date: 03/05/2026
8+
ms.date: 06/25/2025
99
ms.service: azure-sql
1010
ms.subservice: security
1111
ms.topic: how-to
@@ -52,7 +52,7 @@ Go to the [Azure portal](https://portal.azure.com)
5252

5353
For Az PowerShell module installation instructions, see [Install Azure PowerShell](/powershell/azure/install-az-ps). Use [the new Azure PowerShell Az module](/powershell/azure/new-azureps-module-az).
5454

55-
# [Azure CLI](#tab/azure-cli)
55+
# [The Azure CLI](#tab/azure-cli)
5656

5757
For installation, see [Install the Azure CLI](/cli/azure/install-azure-cli).
5858

@@ -104,7 +104,7 @@ Set-AzSqlInstanceTransparentDataEncryptionProtector -Type AzureKeyVault -KeyId <
104104
-AutoRotationEnabled <boolean>
105105
```
106106

107-
# [Azure CLI](#tab/azure-cli)
107+
# [The Azure CLI](#tab/azure-cli)
108108

109109
For information on installing the current release of Azure CLI, see [Install the Azure CLI](/cli/azure/install-azure-cli) article.
110110

@@ -152,7 +152,7 @@ To enable automatic rotation for the TDE protector at the database level using P
152152
Set-AzSqlDatabase -ResourceGroupName <resource_group_name> -ServerName <server_name> -DatabaseName <database_name> -EncryptionProtectorAutoRotation:$true
153153
```
154154

155-
# [Azure CLI](#tab/azure-cli)
155+
# [The Azure CLI](#tab/azure-cli)
156156

157157
To enable automatic rotation for the TDE protector at the database level using the Azure CLI, see the following command. Use the `--encryption-protector-auto-rotation` parameter and set to `True` to enable automatic key rotation or `False` to disable automatic key rotation.
158158

@@ -234,7 +234,7 @@ The `<keyVaultKeyId>` can be [retrieved from Azure Key Vault](/azure/key-vault/k
234234

235235
### <a id="using-different-keys-for-each-server"></a> Use different keys for each server
236236

237-
It's possible to configure the primary and secondary servers with a different key vault key when configuring TDE with CMK in the Azure portal. It's not evident in the Azure portal that the key used to protect the primary server is also the same key that protects the primary database that has been replicated to the secondary server. However, you can use PowerShell, Azure CLI, or REST APIs to obtain details about keys that are used on the server. This shows that auto rotated keys are transferred from the primary server to the secondary server.
237+
It's possible to configure the primary and secondary servers with a different key vault key when configuring TDE with CMK in the Azure portal. It's not evident in the Azure portal that the key used to protect the primary server is also the same key that protects the primary database that has been replicated to the secondary server. However, you can use PowerShell, the Azure CLI, or REST APIs to obtain details about keys that are used on the server. This shows that auto rotated keys are transferred from the primary server to the secondary server.
238238

239239
Here's an example of using PowerShell commands to check for keys that are transferred from the primary server to the secondary server after key rotation.
240240

@@ -325,7 +325,7 @@ Set-AzSqlInstanceTransparentDataEncryptionProtector -Type AzureKeyVault -KeyId <
325325
-InstanceName <ManagedInstanceName> -ResourceGroup <ManagedInstanceResourceGroupName>
326326
```
327327

328-
# [Azure CLI](#tab/azure-cli)
328+
# [The Azure CLI](#tab/azure-cli)
329329

330330
Use the [az keyvault key create](/cli/azure/keyvault/key#az-keyvault-key-create) command to add a new key to the key vault.
331331

@@ -407,7 +407,7 @@ Using the Azure portal to switch the TDE protector from Microsoft-managed to BYO
407407
-InstanceName <ManagedInstanceName> -ResourceGroup <ManagedInstanceResourceGroupName>e>
408408
```
409409

410-
# [Azure CLI](#tab/azure-cli)
410+
# [The Azure CLI](#tab/azure-cli)
411411

412412
**Azure SQL Database**
413413

azure-sql/database/transparent-data-encryption-byok-overview.md

Lines changed: 1 addition & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: Bring Your Own Key (BYOK) support for transparent data encryption (
55
author: Pietervanhove
66
ms.author: pivanho
77
ms.reviewer: wiassaf, vanto, mathoma, randolphwest
8-
ms.date: 03/05/2026
8+
ms.date: 09/16/2025
99
ms.service: azure-sql
1010
ms.subservice: security
1111
ms.topic: concept-article
@@ -219,24 +219,6 @@ Auditors can use Azure Monitor to review managed HSM AuditEvent logs, if logging
219219
220220
- To remove a potentially compromised key during a security incident without the risk of data loss, follow the steps in the article [Remove a Transparent Data Encryption (TDE) protector using PowerShell](transparent-data-encryption-byok-remove-tde-protector.md).
221221
222-
> [!TIP]
223-
> **Using versioned and versionless Azure Key Vault keys for TDE**
224-
>
225-
> When you set the TDE protector, you can reference an Azure Key Vault key using either a specific key version or a versionless key identifier.
226-
>
227-
> In both cases, Azure SQL Database always resolves and uses the latest enabled version of the key in Azure Key Vault or Azure Key Vault Managed HSM. Use versionless key identifiers to avoid embedding a specific key version in the TDE protector configuration.
228-
>
229-
> Versionless key identifiers are currently supported only for Azure SQL Database.
230-
>
231-
> Examples:
232-
> - Key identifier that includes a specific version
233-
>
234-
> `https://<key-vault-name>.vault.azure.net/keys/<key-name>/<key-version>`
235-
>
236-
> - Versionless key identifier
237-
>
238-
> `https://<key-vault-name>.vault.azure.net/keys/<key-name>`
239-
240222
## Rotation of TDE protector
241223
242224
Rotating the TDE protector for a server means to switch to a new asymmetric key that protects the databases on the server. Key rotation is an online operation and should only take a few seconds to complete. The operation only decrypts and re-encrypts the database encryption key, not the entire database.

azure-sql/database/transparent-data-encryption-byok-remove-tde-protector.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
2-
title: Remove TDE protector (PowerShell & Azure CLI)
2+
title: Remove TDE protector (PowerShell & the Azure CLI)
33
titleSuffix: Azure SQL Database & Azure Synapse Analytics
44
description: Learn how to respond to a potentially compromised TDE protector for Azure SQL Database or Azure Synapse Analytics using TDE with Bring Your Own Key (BYOK) support.
55
author: Pietervanhove
66
ms.author: pivanho
77
ms.reviewer: wiassaf, vanto, mathoma
8-
ms.date: 03/05/2026
8+
ms.date: 06/25/2025
99
ms.service: azure-sql-database
1010
ms.subservice: security
1111
ms.topic: how-to
@@ -43,9 +43,9 @@ This how-to guide goes over the approach to render databases **inaccessible** af
4343

4444
For Az module installation instructions, see [Install Azure PowerShell](/powershell/azure/install-az-ps). Use [the new Azure PowerShell Az module](/powershell/azure/new-azureps-module-az).
4545

46-
# [Azure CLI](#tab/azure-cli)
46+
# [The Azure CLI](#tab/azure-cli)
4747

48-
For installation, see [Install Azure CLI](/cli/azure/install-azure-cli).
48+
For installation, see [Install the Azure CLI](/cli/azure/install-azure-cli).
4949

5050
* * *
5151

@@ -68,13 +68,13 @@ The following query returns the VLFs and the TDE Protector respective thumbprint
6868
SELECT * FROM sys.dm_db_log_info (database_id)
6969
```
7070

71-
Alternatively, you can use PowerShell or Azure CLI:
71+
Alternatively, you can use PowerShell or the Azure CLI:
7272

7373
# [PowerShell](#tab/azure-powershell)
7474

7575
The PowerShell command `Get-AzSqlServerKeyVaultKey` provides the thumbprint of the TDE Protector used in the query, so you can see which keys to keep and which keys to delete in Azure Key Vault. Only keys no longer used by the database can be safely deleted from Azure Key Vault.
7676

77-
# [Azure CLI](#tab/azure-cli)
77+
# [The Azure CLI](#tab/azure-cli)
7878

7979
The PowerShell command `az sql server key show` provides the thumbprint of the TDE Protector used in the query, so you can see which keys to keep and which keys to delete in Azure Key Vault. Only keys no longer used by the database can be safely deleted from Azure Key Vault.
8080

@@ -125,9 +125,9 @@ The PowerShell command `az sql server key show` provides the thumbprint of the
125125
Restore-AzKeyVaultKey -VaultName <KeyVaultName> -InputFile <BackupFilePath>
126126
```
127127

128-
# [Azure CLI](#tab/azure-cli)
128+
# [The Azure CLI](#tab/azure-cli)
129129

130-
For command reference, see [Azure CLI keyvault](/cli/azure/keyvault/key).
130+
For command reference, see the [Azure CLI keyvault](/cli/azure/keyvault/key).
131131

132132
1. Create a [new key in Azure Key Vault](/cli/azure/keyvault/key#az-keyvault-key-create). Make sure this new key is created in a separate key vault from the potentially compromised TDE protector, since access control is provisioned on a vault level.
133133

0 commit comments

Comments
 (0)