Skip to content

Commit 1c746e4

Browse files
authored
Merge pull request #6942 from aliceku/master
removed list permissions from key requirements
2 parents 42a828e + bee1046 commit 1c746e4

1 file changed

Lines changed: 3 additions & 3 deletions

File tree

docs/relational-databases/security/encryption/setup-steps-for-extensible-key-management-using-the-azure-key-vault.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "SQL Server TDE Extensible Key Management Using Azure Key Vault - Setup Steps | Microsoft Docs"
33
ms.custom: ""
4-
ms.date: "06/11/2018"
4+
ms.date: "08/24/2018"
55
ms.prod: sql
66
ms.reviewer: ""
77
ms.suite: "sql"
@@ -147,14 +147,14 @@ SQL Server Version |Redistributable Install Link
147147
In this case, let’s use the Azure Active Directory service principal created in Part I to authorize the [!INCLUDE[ssNoVersion](../../../includes/ssnoversion-md.md)] instance.
148148
149149
> [!IMPORTANT]
150-
> The Azure Active Directory service principal must have at least the `get`, `list`, `wrapKey`, and `unwrapKey` permissions for the key vault.
150+
> The Azure Active Directory service principal must have at least the `get`, `wrapKey`, and `unwrapKey` permissions for the key vault.
151151
152152
As shown below, use the **Client ID** from Part I for the `ServicePrincipalName` parameter. The `Set-AzureRmKeyVaultAccessPolicy` runs silently with no output if it runs successfully.
153153
154154
```powershell
155155
Set-AzureRmKeyVaultAccessPolicy -VaultName 'ContosoDevKeyVault'`
156156
-ServicePrincipalName EF5C8E09-4D2A-4A76-9998-D93440D8115D `
157-
-PermissionsToKeys get, list, wrapKey, unwrapKey
157+
-PermissionsToKeys get, wrapKey, unwrapKey
158158
```
159159
160160
Call the `Get-AzureRmKeyVault` cmdlet to confirm the permissions. In the statement output under ‘Access Policies,’ you should see your AAD application name listed as another tenant that has access to this key vault.

0 commit comments

Comments
 (0)