Azure Key Vault should be recoverable
Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel,
n'hésitez pas à nous contacter.
Description
The key vault contains object keys, secrets, and certificates. If a key vault is made unavailable accidentally, it can cause immediate data loss or loss of security functions supported by the key vault objects. This includes authentication, validation, verification, and non-repudiation. It is recommended that the key vault be made recoverable by enabling the “Do Not Purge” and “Soft Delete” functions. This prevents loss of encrypted data, including storage accounts, SQL databases, and dependent services provided by key vault objects (keys, secrets, certificates, etc.), which may occur due to accidental deletion by a user or from disruptive activity by a malicious user.
Note: When a new key vault is created, the enableSoftDelete
and enablePurgeProtection
parameters are set to null
by default, disabling both features.
Enable “Do Not Purge” and “Soft Delete” for a key vault.
From the console
- Log in to the Azure Portal.
- Go to Key Vaults and click Properties.
- Verify that the status of soft-delete is set to ‘Soft delete has been enabled on this key vault’.
- At the bottom of the page, click ‘Enable Purge Protection’.