Skip to content

Commit b0f448d

Browse files
Merge branch 'main' of https://github.com/MicrosoftDocs/sql-docs-pr into 20240416-remove-sql-mi-label
2 parents edd96da + 636613a commit b0f448d

2 files changed

Lines changed: 1 addition & 3 deletions

File tree

docs/relational-databases/security/encryption/always-encrypted-enclaves.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -219,6 +219,7 @@ The following limitations are specific to Always Encrypted with secure enclaves:
219219
- Tooling limitations:
220220
- The only supported key stores for storing enclave-enabled column master keys are Windows Certificate Store and Azure Key Vault.
221221
- To trigger an in-place cryptographic operation via `ALTER TABLE`/`ALTER COLUMN`, you need to issue the statement using a query window in SSMS or Azure Data Studio, or you can write your own program that issues the statement. Currently, the `Set-SqlColumnEncryption` cmdlet in the SqlServer PowerShell module and the Always Encrypted wizard in SQL Server Management Studio don't support in-place encryption. Move the data out of the database for cryptographic operations, even if the column encryption keys used for the operations are enclave-enabled.
222+
- When you restore a VBS enclave-enabled database, it's essential to reconfigure the VBS enclave setting again.
222223

223224
## Next steps
224225

docs/relational-databases/security/encryption/configure-always-encrypted-keys-using-ssms.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -34,9 +34,6 @@ The **New Column Master Key** dialog allows you to generate a column master key
3434
- **Certificate Store - Current User** - indicates the Current User certificate store location in the Windows Certificate Store, which is your personal store.
3535
- **Certificate Store - Local computer** - indicates the Local computer certificate store location in the Windows Certificate Store.
3636
- **Azure Key Vault** - you need to sign in to Azure (click **Sign in**). Once you sign in, you are able to select one of your Azure subscriptions and a key vault or a managed HSM (requires SSMS 18.9 or later).
37-
> [!NOTE]
38-
> The **New Column Master Key** dialog does not currently support key vaults using role permissions for authorization. Only key vaults using access policies are supported.
39-
4037
> [!NOTE]
4138
> Using column master keys stored in a [managed HSM](/azure/key-vault/managed-hsm/overview) in Azure Key Vault requires SSMS 18.9 or a later version.
4239

0 commit comments

Comments
 (0)