Skip to content

Commit

Permalink
Update modules/ROOT/pages/security/encryption.adoc
Browse files Browse the repository at this point in the history
Co-authored-by: Jessica Wright <[email protected]>
  • Loading branch information
fiquick and AlexicaWright authored Feb 17, 2025
1 parent d580926 commit 8fb72fb
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion modules/ROOT/pages/security/encryption.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -170,7 +170,7 @@ For more information about the Azure CLI, see link:https://learn.microsoft.com/e

=== Azure key rotation

Customers have observed that after rotating their Azure Key and immediately disabling the old version of the key, the connection status in Aura changes from "Ready" to "Pending".
If you rotate an Azure key and immediately disable the old one, there is a chance that the connection status in Aura changes from "Ready" to "Pending".
This happens because Azure Storage checks for key updates once every 24 hours, as outlined in link:https://learn.microsoft.com/en-gb/azure/storage/common/customer-managed-keys-configure-new-account?toc=%2Fazure%2Fstorage%2Fblobs%2Ftoc.json&bc=%2Fazure%2Fstorage%2Fblobs%2Fbreadcrumb%2Ftoc.json&tabs=azure-portal#configure-encryption-for-automatic-updating-of-key-versions[Microsoft Azure documentation].
If a key is rotated and the old version is disabled before this time passes, services relying on the key in Neo4j Aura lose access.
We recommended waiting at least 24 hours after rotating a key before disabling the old version to allow the change to take effect in Azure. Disabling the old version too early results in Aura losing access to the key.
Expand Down

0 comments on commit 8fb72fb

Please sign in to comment.