Lokasi ngalangkungan proxy:   [ UP ]  
[Ngawartoskeun bug]   [Panyetelan cookie]                
Skip to content

Commit 6e166ba

Browse files
committed
[SCOPED] Fix smart quotes
1 parent f185176 commit 6e166ba

17 files changed

Lines changed: 24 additions & 24 deletions

azure-sql/database/always-encrypted-enclaves-plan.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ SGX enclaves are recommended for workloads that require the strongest data confi
4343
> [!NOTE]
4444
> VBS enclaves are available in all Azure SQL Database regions **except**: Jio India Central.
4545
46-
VBS enclaves are the recommended solution for customers who seek protection for data in use from high-privileged users in the customers organization, including Database Administrators (DBAs). Without having the cryptographic keys protecting the data, a DBA won't be able to access the data in plaintext.
46+
VBS enclaves are the recommended solution for customers who seek protection for data in use from high-privileged users in the customer's organization, including Database Administrators (DBAs). Without having the cryptographic keys protecting the data, a DBA won't be able to access the data in plaintext.
4747

4848
VBS enclaves can also help prevent some OS-level threats, such as exfiltrating sensitive data from memory dumps within a VM hosting your database. The plaintext data processed in an enclave doesn't show up in memory dumps, providing the code inside the enclave and its properties haven't been maliciously altered. However, VBS enclaves in Azure SQL Database can't address more sophisticated attacks, such as replacing the enclave binary with malicious code, due to the current lack of enclave attestation. Also, regardless of attestation, VBS enclaves don't provide any protection from attacks using privileged system accounts originating from the host. It's important to note that Microsoft has implemented multiple layers of security controls to detect and prevent such attacks in the Azure cloud, including just-in-time access, multi-factor authentication, and security monitoring. Nevertheless, customers who require strong security isolation may prefer Intel SGX enclaves with the DC-series hardware configuration over VBS enclaves.
4949

azure-sql/database/transparent-data-encryption-byok-cross-tenant.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ You can configure TDE with CMK for Azure SQL Database for keys stored in key vau
2525
2626
## Common use scenario
2727

28-
Cross-tenant CMK capabilities allow service providers or independent software vendors (ISV) building services on top of Azure SQL to extend Azure SQLs TDE with CMK capabilities to their respective customers. With cross-tenant CMK support enabled, ISV customers can own the key vault and encryption keys in their own subscription and Azure AD tenant. The customer has full control over key management operations, while accessing Azure SQL resources in the ISV tenant.
28+
Cross-tenant CMK capabilities allow service providers or independent software vendors (ISV) building services on top of Azure SQL to extend Azure SQL's TDE with CMK capabilities to their respective customers. With cross-tenant CMK support enabled, ISV customers can own the key vault and encryption keys in their own subscription and Azure AD tenant. The customer has full control over key management operations, while accessing Azure SQL resources in the ISV tenant.
2929

3030
## Cross-tenant interactions
3131

azure-sql/database/transparent-data-encryption-byok-database-level-basic-actions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -464,7 +464,7 @@ GET https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{
464464
Retrieve the basic database level customer-managed key settings from a database and the current keys in use
465465

466466
```rest
467-
GET https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Sql/servers/{serverName}/databases/{databaseName}?api-version=2022-08-01-preview&$expand=keys($filter=pointInTime(current))
467+
GET https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Sql/servers/{serverName}/databases/{databaseName}?api-version=2022-08-01-preview&$expand=keys($filter=pointInTime('current'))
468468
```
469469

470470
Retrieve the basic database level customer-managed key settings from a database and the keys in use at a particular point in time

azure-sql/database/transparent-data-encryption-byok-database-level-geo-replication-restore.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -149,7 +149,7 @@ Use a [Custom deployment in the Azure portal](https://portal.azure.com/#create/M
149149
- Prepopulate the list of current keys in use by the primary database using the following REST API request:
150150

151151
```rest
152-
GET https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Sql/servers/{serverName}/databases/{databaseName}?api-version=2022-08-01-preview&$expand=keys($filter=pointInTime(current))
152+
GET https://management.azure.com/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Sql/servers/{serverName}/databases/{databaseName}?api-version=2022-08-01-preview&$expand=keys($filter=pointInTime('current'))
153153
```
154154
155155
- Select the user-assigned managed identity (and federated client ID if configuring cross tenant access).

azure-sql/database/transparent-data-encryption-byok-database-level-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ As more service providers, also known as independent software vendors (ISVs), us
4040

4141
However, there's one significant limitation to this approach. When multiple databases are hosted on the same Azure SQL logical server, they share the server-level TDE protector. ISVs are unable to offer true customer-managed keys (CMK) capabilities to their customers. Without the ability to manage their own encryption keys, customers may be hesitant to entrust sensitive data to the ISV's service, particularly if compliance regulations require them to maintain full control over their encryption keys.
4242

43-
With database level TDE CMK, ISVs can offer CMK capability to their customers and achieve security isolation, as each databases TDE protector can potentially be owned by the respective ISV customer in a key vault that they own. The security isolation achieved for ISVs customers is both in terms of the *key* and the *identity* used to access the key.
43+
With database level TDE CMK, ISVs can offer CMK capability to their customers and achieve security isolation, as each database's TDE protector can potentially be owned by the respective ISV customer in a key vault that they own. The security isolation achieved for ISV's customers is both in terms of the *key* and the *identity* used to access the key.
4444

4545
The diagram below summarizes the new functionality indicated above. It presents two separate Azure AD tenants. The `Best Services` tenant that contains the Azure SQL logical server with two databases, `DB 1` and `DB 2`, and the `Azure Key Vault 1` with a `Key 1` accessing the database `DB 1` using `UMI 1`. Both `UMI 1` and `Key 1` represent the server level setting. By default, all databases created initially on this server inherit this setting for TDE with CMK. The `Contoso` tenant represents a client tenant that contains `Azure Key Vault 2` with a `Key 2` assessing the database `DB 2` across the tenant as part of the database level CMK cross-tenant support using `Key 2` and `UMI 2` setup for this database.
4646

@@ -124,7 +124,7 @@ In case of an inaccessible TDE protector as described in [Transparent data encry
124124
125125
### Additional considerations
126126

127-
- If TDE with CMK is already enabled at the server level, setting CMK for a particular database overrides the server level CMK setting (databases DEK gets re-encrypted with the database-level TDE protector).
127+
- If TDE with CMK is already enabled at the server level, setting CMK for a particular database overrides the server level CMK setting (database's DEK gets re-encrypted with the database-level TDE protector).
128128
- Any logical server level key changes or rotations don't affect database level CMK settings and the database continues to use its own CMK setting.
129129
- Database level CMK isn't supported through Transact-SQL (T-SQL).
130130
- The logical server user-assigned managed identity (UMI) can be used at the database level. However, it's recommended to use a designated UMI for the database level CMK.

azure-sql/managed-instance/managed-instance-link-feature-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -168,7 +168,7 @@ Feature limitations include:
168168
- If you're using Transparent Data Encryption (TDE) to encrypt SQL Server databases, the database encryption key from SQL Server needs to be exported and uploaded to Azure Key Vault, and you need to also configure the BYOK TDE option on SQL Managed Instance before creating the link.
169169
- You can't establish a link between SQL Server and SQL Managed Instance if the functionality that's used on the SQL Server instance isn't supported on the managed instance. For example:
170170
- Databases with file tables and file streams can't be replicated, because SQL Managed Instance doesn't support file tables or file streams.
171-
- Databases that use In-Memory OLTP (Hekaton) can be replicated only to the *Business Critical* service tier for SQL Managed Instance, because the *General Purpose* service tier doesn't support In-Memory OLTP. Databases with multiple Hekaton files cant be replicated to the Business Critical service tier for SQL Managed Instance, as multiple Hekaton files aren't supported.
171+
- Databases that use In-Memory OLTP (Hekaton) can be replicated only to the *Business Critical* service tier for SQL Managed Instance, because the *General Purpose* service tier doesn't support In-Memory OLTP. Databases with multiple Hekaton files can't be replicated to the Business Critical service tier for SQL Managed Instance, as multiple Hekaton files aren't supported.
172172

173173
Trying to add an unsupported functionality to a replicated database in:
174174
- SQL Server 2019 and 2022 fails with an error.

docs/azure-data-studio/download-azure-data-studio.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.custom: intro-overview
1313

1414
Azure Data Studio is a lightweight, cross-platform data management and development tool with connectivity to popular cloud and on-premises databases. Azure Data Studio supports Windows, macOS, and Linux, with immediate capability to connect to Azure SQL and SQL Server. Browse the extension library for more database support options including MySQL, PostgreSQL, and CosmosDB.
1515

16-
Azure Data Studios familiar interface offers a modern editor experience with IntelliSense, code snippets, source control integration, and an integrated terminal. Engineered with the data platform user in mind, its extensibility allows users to customize their experience by installing the extensions relevant to their workflow, including database migrations, charting, GitHub Copilot, and more!
16+
Azure Data Studio's familiar interface offers a modern editor experience with IntelliSense, code snippets, source control integration, and an integrated terminal. Engineered with the data platform user in mind, its extensibility allows users to customize their experience by installing the extensions relevant to their workflow, including database migrations, charting, GitHub Copilot, and more!
1717

1818
Use Azure Data Studio to query, design, and manage your databases and data warehouses wherever they are, on your local computer or in the cloud.
1919

docs/azure-data-studio/quickstart-azure-cosmos-db-mongodb.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ Your server will open in the **SERVERS** sidebar after you've successfully conne
6060
### [API for MongoDB (vCore)](#tab/mongodb-vcore)
6161

6262
1. Open the new Azure Cosmos DB for MongoDB (vCore) account in the Azure Portal.
63-
2. Navigate to Settings > Connection string. and copy the shown Connection string.
63+
2. Navigate to "Settings" > "Connection string". and copy the shown "Connection string".
6464

6565
:::image type="content" source="media/quickstart-azure-cosmos-db-mongodb/connection-string-in-portal.png" lightbox="media/quickstart-azure-cosmos-db-mongodb/connection-string-in-portal.png" alt-text="Screenshot of the connection string in the portal.":::
6666

docs/azure-data-studio/release-notes-azure-data-studio.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -283,7 +283,7 @@ For a full list of bug fixes addressed for the May 2023 release, visit the [May
283283
| Connection | Added ability to include optional name and grouping when creating a new connection using a connection string |
284284
| Connection | Updating username in MSSQL connections to use Preferred username for the display name |
285285
| Connection | Fixed issue with encoding for OSX keychain on macOS |
286-
| Connection | Added support for Azure AD Multi-Factor Authentication and Sql Authentication Provider on Linux |
286+
| Connection | Added support for Azure AD Multi-Factor Authentication and 'Sql Authentication Provider' on Linux |
287287
| Dataverse | Addressed error generated when expanding the database node for a Dataverse database in Object Explorer |
288288
| IntelliCode extension | Fixed error that occurred when launching Azure Data Studio with Visual Studio Code IntelliCode extension installed |
289289
| PostgreSQL extension | Implemented support for exporting query results on Apple M1 from a notebook |

docs/azure-data-studio/what-is-azure-data-studio.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.custom: intro-overview
1414

1515
Azure Data Studio is a lightweight, cross-platform data management and development tool with connectivity to popular cloud and on-premises databases. Azure Data Studio supports Windows, macOS, and Linux, with immediate capability to connect to Azure SQL and SQL Server. Browse the extension library for more database support options including MySQL, PostgreSQL, and CosmosDB.
1616

17-
Azure Data Studios familiar interface offers a modern editor experience with IntelliSense, code snippets, source control integration, and an integrated terminal. Engineered with the data platform user in mind, its extensibility allows users to customize their experience by installing the extensions relevant to their workflow, including database migrations, charting, GitHub Copilot, and more!
17+
Azure Data Studio's familiar interface offers a modern editor experience with IntelliSense, code snippets, source control integration, and an integrated terminal. Engineered with the data platform user in mind, its extensibility allows users to customize their experience by installing the extensions relevant to their workflow, including database migrations, charting, GitHub Copilot, and more!
1818

1919
The source code for Azure Data Studio and its data providers is available on GitHub under a source code EULA that provides rights to modify and use the software, but not to redistribute it or host it in a cloud service. For more information, see [Azure Data Studio FAQ](faq.yml).
2020

0 commit comments

Comments
 (0)