diff --git a/docs/relational-databases/security/encryption/configure-always-encrypted-enclaves.md b/docs/relational-databases/security/encryption/configure-always-encrypted-enclaves.md index 9ff3f113f15..e273d3f84be 100644 --- a/docs/relational-databases/security/encryption/configure-always-encrypted-enclaves.md +++ b/docs/relational-databases/security/encryption/configure-always-encrypted-enclaves.md @@ -864,13 +864,13 @@ To use Always Encrypted with secure enclaves in a .NET Framework application, yo 4. Install the following NuGet package by going to **Tools** (main menu) > **NuGet Package Manager** > **Package Manager Console**. Run the following code in the Package Manager Console. ```powershell - Install-Package Microsoft.SqlServer.Management.AlwaysEncrypted.AzureKeyVaultProvider --IncludePrerelease + Install-Package Microsoft.SqlServer.Management.AlwaysEncrypted.EnclaveProviders -IncludePrerelease ``` 5. If you use Azure Key Vault for storing your column master keys, install the following NuGet packages by going to **Tools** (main menu) > **NuGet Package Manager** > **Package Manager Console**. Run the following code in the Package Manager Console. ```powershell - Install-Package Microsoft.SqlServer.Management.AlwaysEncrypted.AzureKeyVaultProvider --IncludePrerelease -Version 2.2.0 + Install-Package Microsoft.SqlServer.Management.AlwaysEncrypted.AzureKeyVaultProvider -IncludePrerelease -Version 2.2.0 Install-Package Microsoft.IdentityModel.Clients.ActiveDirectory ``` @@ -879,16 +879,17 @@ To use Always Encrypted with secure enclaves in a .NET Framework application, yo 8. Locate the \ section. Within the \ section, locate the \ section. Add the following section within the \: ```xml -
+
``` 9. Inside the configuration section, below the \, add the following section, which specific an enclave provider to be used to attest and interact with Intel SGX enclaves: ```xml - \ - \ - \ - \ + + + + + ``` ### Develop and test your app