You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: data-explorer/cluster-encryption-double.md
+18-18Lines changed: 18 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,48 +1,48 @@
1
1
---
2
-
title: Enable double encryption for your cluster in Azure Data Explorer
2
+
title: Enable Double Encryption for Your Custer in Azure Data Explorer
3
3
description: This article describes how to enable infrastructure encryption (double encryption) during cluster creation in Azure Data Explorer.
4
4
ms.reviewer: toleibov
5
5
ms.topic: how-to
6
6
ms.custom: devx-track-arm-template
7
-
ms.date: 02/04/2025
7
+
ms.date: 03/15/2026
8
8
---
9
9
10
10
# Enable double encryption for your cluster in Azure Data Explorer
11
11
12
-
When you create a cluster, data is[automatically encrypted](/azure/storage/common/storage-service-encryption) at the service level. For greater data security, you can additionally enable [double encryption](/azure/storage/common/infrastructure-encryption-enable).
12
+
When you create a cluster, the service[automatically encrypts](/azure/storage/common/storage-service-encryption) data at the service level. For greater data security, you can additionally enable [double encryption](/azure/storage/common/infrastructure-encryption-enable).
13
13
14
-
When double encryption is enabled, data in the storage account is encrypted twice, using two different algorithms.
14
+
When you enable double encryption, the cluster encrypts data in the storage account twice by using two different algorithms.
15
15
16
16
> [!IMPORTANT]
17
17
>
18
-
> *Enabling double encryption is only possible during cluster creation.
19
-
> *Once infrastructure encryption is enabled on your cluster, you **can't** disable it.
18
+
> *You can enable double encryption only during cluster creation.
19
+
> *After you enable infrastructure encryption on your cluster, you **can't** disable it.
20
20
21
21
> For code samples based on previous SDK versions, see the [archived article](/previous-versions/azure/data-explorer/cluster-encryption-double).
22
22
23
23
## [Azure portal](#tab/portal)
24
24
25
-
1.[Create an Azure Data Explorer cluster](create-cluster-and-database.md#create-a-cluster)
26
-
1. In the **Security** tab >**Enable Double Encryption**, select **On**. To remove the double encryption, select **Off**.
25
+
1.[Create an Azure Data Explorer cluster](create-cluster-and-database.md#create-a-cluster).
26
+
1. In the **Security** tab, under**Enable Double Encryption**, select **On**. To remove double encryption, select **Off**.
27
27
1. Select **Next:Network>** or **Review + create** to create the cluster.
28
28
29
29
:::image type="content" source="media/double-encryption/double-encryption-portal.png" alt-text="Screenshot of security tab, showing double encryption being enabled on a new cluster.":::
30
30
31
31
## [C#](#tab/c-sharp)
32
32
33
-
You can enable infrastructure encryption during cluster creation using C#.
33
+
You can enable infrastructure encryption during cluster creation by using C#.
34
34
35
35
## Prerequisites
36
36
37
-
Set up a managed identity using the Azure Data Explorer C# client:
37
+
Set up a managed identity by using the Azure Data Explorer C# client:
38
38
39
39
* Install the [Azure Data Explorer NuGet package](https://www.nuget.org/packages/Azure.ResourceManager.Kusto/).
40
40
* Install the [Azure.Identity NuGet package](https://www.nuget.org/packages/Azure.Identity/) for authentication.
41
-
*[Create a Microsoft Entra application](/azure/active-directory/develop/howto-create-service-principal-portal) and service principal that can access resources. You add role assignment at the subscription scope and get the required `Directory (tenant) ID`, `Application ID`, and `Client Secret`.
41
+
*[Create a Microsoft Entra application](/azure/active-directory/develop/howto-create-service-principal-portal) and service principal that can access resources. Add role assignment at the subscription scope and get the required `Directory (tenant) ID`, `Application ID`, and `Client Secret`.
42
42
43
43
## Create your cluster
44
44
45
-
1. Create your cluster using the `enableDoubleEncryption` property:
45
+
1. Create your cluster by using the `enableDoubleEncryption` property:
46
46
47
47
```csharp
48
48
vartenantId="xxxxxxxx-xxxxx-xxxx-xxxx-xxxxxxxxx"; //Directory (tenant) ID
@@ -63,23 +63,23 @@ Set up a managed identity using the Azure Data Explorer C# client:
AnAzureResourceManagertemplatecanbeusedtoautomatedeploymentofyourAzureresources. TolearnmoreaboutdeployingtoAzureDataExplorer, see [CreateanAzureDataExplorerclusteranddatabasebyusinganAzureResourceManagertemplate](create-cluster-database.md?tabs=arm).
78
+
YoucanuseanAzureResourceManagertemplatetoautomatedeploymentofyourAzureresources. TolearnmoreaboutdeployingtoAzureDataExplorer, see [CreateanAzureDataExplorerclusteranddatabasebyusinganAzureResourceManagertemplate](create-cluster-database.md?tabs=arm).
0 commit comments