Skip to content

Commit

Permalink
Update modules/ROOT/pages/security/encryption.adoc
Browse files Browse the repository at this point in the history
Co-authored-by: Guangxue <[email protected]>
  • Loading branch information
fiquick and GuangxueCao authored Feb 17, 2025
1 parent 6ae411b commit 1f9a823
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion modules/ROOT/pages/security/encryption.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -170,7 +170,7 @@ For more information about the Azure CLI, see link:https://learn.microsoft.com/e

=== Azure key rotation

If you rotate an Azure key and immediately disable the old one, the connection status in Aura changes from "Ready" to "Pending".
If you immediately disable the old key version after the Azure key is rotated, the connection status in Aura changes from "Ready" to "Pending".
This happens because Azure Storage checks for key updates once every 24 hours, as outlined in link:https://learn.microsoft.com/en-gb/azure/storage/common/customer-managed-keys-configure-new-account?toc=%2Fazure%2Fstorage%2Fblobs%2Ftoc.json&bc=%2Fazure%2Fstorage%2Fblobs%2Fbreadcrumb%2Ftoc.json&tabs=azure-portal#configure-encryption-for-automatic-updating-of-key-versions[Microsoft Azure documentation].
If a key is rotated and the old version is disabled before this time passes, services relying on the key in Neo4j Aura lose access.
To avoid this wait at least 24 hours after rotating a key before disabling the old version to allow the change to take effect in Azure.
Expand Down

0 comments on commit 1f9a823

Please sign in to comment.