Abstract
In the previous two chapters, we deployed a Hyperscale database into a virtual network using a private endpoint and learned how to manage it using a management VM and Azure Bastion. In this chapter, we will continue to satisfy the nonfunctional requirements laid out in Chapter 4, by configuring transparent data encryption to use a key managed by our organization.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature
About this chapter
Cite this chapter
Barać, Z., Scott-Raynsford, D. (2023). Configuring Transparent Data Encryption to Bring Your Own Key. In: Azure SQL Hyperscale Revealed. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-9225-9_6
Download citation
DOI: https://doi.org/10.1007/978-1-4842-9225-9_6
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-9224-2
Online ISBN: 978-1-4842-9225-9
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)