Lokasi ngalangkungan proxy:   [ UP ]  
[Ngawartoskeun bug]   [Panyetelan cookie]                
Skip to content

Commit ace469f

Browse files
authored
Merge pull request #21924 from shohamMSFT/patch-10
Added Thales CTM known issue
2 parents 1ecbc15 + d9e22db commit ace469f

1 file changed

Lines changed: 2 additions & 0 deletions

File tree

azure-sql/database/transparent-data-encryption-byok-overview.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -112,6 +112,8 @@ Auditors can use Azure Monitor to review key vault AuditEvent logs, if logging i
112112
> Azure SQL now supports using a RSA key stored in a Managed HSM as TDE Protector.
113113
Azure Key Vault Managed HSM is a fully managed, highly available, single-tenant, standards-compliant cloud service that enables you to safeguard cryptographic keys for your cloud applications, using FIPS 140-2 Level 3 validated HSMs. Learn more about [Managed HSMs](/azure/key-vault/managed-hsm/index).
114114

115+
> [!NOTE]
116+
> An issue with Thales CipherTrust Manager versions prior to v2.8.0 prevents keys newly imported into Azure Key Vault from being used with Azure SQL Database or Azure SQL Managed Instance for customer-managed TDE scenarios. More details about this issue can be found [here](https://thalesdocs.com/ctp/cm/2.6/release_notes/index.html#ciphertrust-cloud-key-manager_1). For such cases, please wait 24 hours after importing the key into key vault to begin using it as TDE Protector for the server or managed instance. This issue has been resolved in Thales CipherTrust Manager [v2.8.0](https://thalesdocs.com/ctp/cm/2.8/release_notes/index.html#resolved-issues).
115117
116118
## Recommendations when configuring customer-managed TDE
117119

0 commit comments

Comments
 (0)