Lokasi ngalangkungan proxy:   [ UP ]  
[Ngawartoskeun bug]   [Panyetelan cookie]                
Skip to content

Commit 6db9055

Browse files
authored
Merge pull request #19218 from David-Engel/patch-1
Document default trusted AKV endpoints
2 parents 7c3fcda + 46db856 commit 6db9055

1 file changed

Lines changed: 18 additions & 2 deletions

File tree

docs/connect/jdbc/using-always-encrypted-with-the-jdbc-driver.md

Lines changed: 18 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Using Always Encrypted with the JDBC driver
33
description: Learn how to use Always Encrypted in your Java application with the JDBC driver for SQL Server to encrypt sensitive data on the server.
44
ms.custom: ""
5-
ms.date: 04/21/2021
5+
ms.date: 04/29/2021
66
ms.prod: sql
77
ms.prod_service: connectivity
88
ms.reviewer: ""
@@ -59,10 +59,26 @@ All of these keystore providers are described in more detail in the sections tha
5959

6060
### Using Azure Key Vault provider
6161

62-
Azure Key Vault is a convenient option to store and manage column master keys for Always Encrypted (especially if your application is hosted in Azure). The Microsoft JDBC Driver for SQL Server includes a built-in provider, `SQLServerColumnEncryptionAzureKeyVaultProvider`, for applications that have keys stored in Azure Key Vault. The name of this provider is AZURE_KEY_VAULT. To use the Azure Key Vault store provider, an application developer needs to create the vault and the keys in Azure Key Vault and create an App registration in Azure Active Directory. The registered application must be granted Get, Decrypt, Encrypt, Unwrap Key, Wrap Key, and Verify permissions in the Access policies defined for the key vault created for use with Always Encrypted. For more information on how to set up the key vault and create a column master key, see [Azure Key Vault - Step by Step](/archive/blogs/kv/azure-key-vault-step-by-step) and [Creating Column Master Keys in Azure Key Vault](../../relational-databases/security/encryption/create-and-store-column-master-keys-always-encrypted.md#creating-column-master-keys-in-azure-key-vault).
62+
Azure Key Vault is a convenient option to store and manage column master keys for Always Encrypted (especially if your application is hosted in Azure). The Microsoft JDBC Driver for SQL Server includes a built-in provider, `SQLServerColumnEncryptionAzureKeyVaultProvider`, for applications that have keys stored in Azure Key Vault. The name of this provider is AZURE_KEY_VAULT.
63+
64+
> [!NOTE]
65+
> The Azure Key Vault provider built in to the JDBC driver supports both [Vaults and Managed HSMs in Azure Key Vault](/azure/key-vault/keys/about-keys).
66+
67+
To use the Azure Key Vault store provider, an application developer needs to create the vault and the keys in Azure Key Vault and create an App registration in Azure Active Directory. The registered application must be granted Get, Decrypt, Encrypt, Unwrap Key, Wrap Key, and Verify permissions in the Access policies defined for the key vault created for use with Always Encrypted. For more information on how to set up the key vault and create a column master key, see [Azure Key Vault - Step by Step](/archive/blogs/kv/azure-key-vault-step-by-step) and [Creating Column Master Keys in Azure Key Vault](../../relational-databases/security/encryption/create-and-store-column-master-keys-always-encrypted.md#creating-column-master-keys-in-azure-key-vault).
6368

6469
When using Azure Key Vault provider, the JDBC driver validates the column master key path against the list of trusted endpoints. Starting with driver version 8.2.2, this list is configurable: create a `mssql-jdbc.properties` file in the working directory of the application, set the `AKVTrustedEndpoints` property to a semicolon-delimited list. If the value begins with a semicolon, it extends the default list; otherwise, it replaces the default list.
6570

71+
The default, trusted endpoints are:
72+
73+
- *vault.azure.net
74+
- *vault.azure.cn
75+
- *vault.usgovcloudapi.net
76+
- *vault.microsoftazure.de
77+
- *managedhsm.azure.net (v9.2+)
78+
- *managedhsm.azure.cn (v9.2+)
79+
- *managedhsm.usgovcloudapi.net (v9.2+)
80+
- *managedhsm.microsoftazure.de (v9.2+)
81+
6682
For the examples on this page, if you've created an Azure Key Vault based column master key and column encryption key by using SQL Server Management Studio, the T-SQL script to re-create them might look similar to this example with its own specific **KEY_PATH** and **ENCRYPTED_VALUE**:
6783

6884
```sql

0 commit comments

Comments
 (0)