Skip to content

Commit 1086730

Browse files
authored
Update setup-steps-for-extensible-key-management-using-the-azure-key-vault.md
Modified the wording "Access" to a more descriptive / accurate verbiage: "Full Control"
1 parent 60eb60d commit 1086730

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

docs/relational-databases/security/encryption/setup-steps-for-extensible-key-management-using-the-azure-key-vault.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -455,7 +455,7 @@ For a note about the minimum permission levels needed for each action in this se
455455
In the preceding example script, `1a4d3b9b393c4678831ccc60def75379` represents the specific version of the key that will be used. If you use this script, it doesn't matter if you update the key with a new version. The key version (for example) `1a4d3b9b393c4678831ccc60def75379` will always be used for database operations. For this scenario, you must complete two prerequisites:
456456

457457
1. Create a **SQL Server Cryptographic Provider** key on **HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\\**.
458-
1. Delegate access permissions on the **SQL Server Cryptographic Provider** key to the user account running the SQL Server database engine service.
458+
1. Delegate "Full Control" permissions on the **SQL Server Cryptographic Provider** key to the user account running the SQL Server database engine service.
459459

460460
> [!NOTE]
461461
> If you use TDE with EKM or Azure Key Vault on a failover cluster instance, you must complete an additional step to add **HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SQL Server Cryptographic Provider** to the Cluster Registry Checkpoint routine, so the registry can sync across the nodes. Syncing facilitates database recovery after failover and key rotation.

0 commit comments

Comments
 (0)