Lokasi ngalangkungan proxy:   [ UP ]  
[Ngawartoskeun bug]   [Panyetelan cookie]                
Skip to content

Commit 3b1dcef

Browse files
authored
Merge pull request #5604 from MicrosoftDocs/master
4/19 AM Publish
2 parents 056ce75 + 5455eff commit 3b1dcef

4 files changed

Lines changed: 16 additions & 14 deletions

File tree

docs/relational-databases/polybase/polybase-guide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ manager: "craigg"
2929
ms.workload: "Active"
3030
---
3131
# PolyBase Guide
32-
[!INCLUDE[appliesto-ss-xxxx-asdw-pdw-md](../../includes/appliesto-ss-xxxx-xxxx-xxx-md.md)]
32+
[!INCLUDE[appliesto-ss-xxxx-asdw-pdw-md](../../includes/appliesto-ss-xxxx-asdw-pdw-md.md)]
3333
PolyBase is a technology that accesses data outside of the database via the t-sql language. In SQL Server 2016, it allows you to run queries on external data in Hadoop or to import/export data from Azure Blob Storage. Queries are optimized to push computation to Hadoop. In Azure SQL Data Warehouse, you can import/export data from Azure Blob Storage and Azure Data Lake Store.
3434

3535

docs/relational-databases/security/encryption/transparent-data-encryption-byok-azure-sql.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ ms.workload: "On Demand"
1717
ms.tgt_pltfrm: ""
1818

1919
ms.topic: "article"
20-
ms.date: "04/16/2018"
20+
ms.date: "04/19/2018"
2121
ms.author: "aliceku"
2222
monikerRange: "= azuresqldb-current || = azure-sqldw-latest || = sqlallproducts-allversions"
2323
---
@@ -62,9 +62,9 @@ When TDE is first configured to use a TDE protector from Key Vault, the server s
6262

6363
### Guidelines for configuring Azure Key Vault
6464

65-
- Use a key vault with [soft-delete](https://docs.microsoft.com/azure/key-vault/key-vault-ovw-soft-delete) enabled to protect from data loss in case of accidental key – or key vault – deletion:
66-
- Soft deleted resources are retained for a set period of time, 90 days unless they are recovered or purged.
67-
- The **recover** and **purge** actions have their own permissions associated in a key vault access policy.
65+
- Configure key vault with [soft-delete](https://docs.microsoft.com/azure/key-vault/key-vault-ovw-soft-delete) enabled to protect from data loss in case of accidental or malicious key – or key vault – deletion. This is a **hard requirement** for TDE with BYOK:
66+
- Soft deleted resources are retained for 90 days unless they are recovered or purged.
67+
- The **recover** and **purge** actions have their own permissions defined in a key vault access policy.
6868
- Grant the logical server access to the key vault using its Azure Active Directory (Azure AD) Identity. When using the Portal UI, the Azure AD identity gets automatically created and the key vault access permissions are granted to the server. Using PowerShell to configure TDE with BYOK, the Azure AD identity must be created and completion should be verified. See [Configure TDE with BYOK](transparent-data-encryption-byok-azure-sql-configure.md) for detailed step-by-step instructions when using PowerShell.
6969

7070
>[!NOTE]

0 commit comments

Comments
 (0)