Skip to content

Commit 8fa3e3f

Browse files
committed
Added steps to change the secret for expired keys
1 parent fb55245 commit 8fa3e3f

1 file changed

Lines changed: 15 additions & 0 deletions

File tree

docs/relational-databases/security/encryption/setup-steps-for-extensible-key-management-using-the-azure-key-vault.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -528,6 +528,21 @@ For a note about the minimum permission levels needed for each action in this se
528528
DROP ASYMMETRIC KEY [EKMSampleASYKey]
529529
DROP CRYPTOGRAPHIC PROVIDER [AzureKeyVault_EKM]
530530
```
531+
> [!NOTE]
532+
> If the credential has a client secret that is about to expire, a new secret can be assigned to the credential.
533+
> <ol>1. Update the secret originally create in <b>Step 1: Set up an Azure AD service principal.</b>
534+
>
535+
> Alter the credential using the same identity and new secret using the following code:
536+
>
537+
> ```sql
538+
> ALTER CREDENTIAL CREDName
539+
> WITH IDENTITY = 'Original Identity',
540+
> SECRET = 'New Secret';
541+
> ```
542+
>
543+
></ol>
544+
> <ol>2. Restart the SQL service</ol>
545+
> <ol>3. Steps 2 and 3 need to be done on all nodes of an Availability Group</ol>
531546

532547
For sample scripts, see the blog at [SQL Server Transparent Data Encryption and Extensible Key Management with Azure Key Vault](https://techcommunity.microsoft.com/t5/sql-server/intro-sql-server-transparent-data-encryption-and-extensible-key/ba-p/1427549).
533548

0 commit comments

Comments
 (0)