You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/key-vault/general/common-error-codes.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ tags: azure-resource-manager
8
8
ms.service: key-vault
9
9
ms.subservice: general
10
10
ms.topic: reference
11
-
ms.date: 09/29/2020
11
+
ms.date: 01/12/2023
12
12
ms.author: mbaldwin
13
13
14
14
#Customer intent: As an Azure Key Vault administrator, I want to react to soft-delete being turned on for all key vaults.
@@ -25,7 +25,7 @@ The error codes listed in the following table may be returned by an operation on
25
25
| VaultNameNotValid | The vault name should be string of 3 to 24 characters and can contain only numbers (0-9), letters (a-z, A-Z), and hyphens (-) |
26
26
| AccessDenied | You may be missing permissions in access policy to do that operation. |
27
27
| ForbiddenByFirewall | Client address isn't authorized and caller isn't a trusted service. |
28
-
| ConflictError | You're requesting multiple operations on the same item, e.g., Key Vault, secret, key, certificate, or common components within a Key Vault like VNET. It's recommended to sequence operations or to implement retry logic. |
28
+
| ConflictError | You're requesting multiple operations on the same item, for example, Key Vault, secret, key, certificate, or common components within a Key Vault like VNET. It's recommended to sequence operations or to implement retry logic. |
29
29
| RegionNotSupported | Specified Azure region isn't supported for this resource. |
30
30
| SkuNotSupported | Specified SKU type isn't supported for this resource. |
Copy file name to clipboardExpand all lines: articles/key-vault/general/customer-data.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ tags: azure-resource-manager
7
7
8
8
ms.service: key-vault
9
9
ms.topic: reference
10
-
ms.date: 01/07/2019
10
+
ms.date: 01/11/2023
11
11
ms.author: mbaldwin
12
12
13
13
---
@@ -35,7 +35,7 @@ The following information identifies customer data within Azure Key Vault:
35
35
36
36
The same REST APIs, Portal experience, and SDKs used to create vaults, keys, secrets, certificates, and managed storage accounts, are also able to update and delete these objects.
37
37
38
-
Soft-delete allows you to recover deleted data for 90 days after deletion. When using soft-delete, the data may be permanently deleted prior to the 90 days retention period expires by performing a purge operation. If the vault or subscription has been configured to block purge operations, it is not possible to permanently delete data until the scheduled retention period has passed.
38
+
Soft-delete allows you to recover deleted data for 90 days after deletion. When using soft-delete, the data may be permanently deleted prior to the 90 days retention period expires by performing a purge operation. If the vault or subscription has been configured to block purge operations, it isn't possible to permanently delete data until the scheduled retention period has passed.
Copy file name to clipboardExpand all lines: articles/key-vault/general/event-grid-logicapps.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,13 +8,13 @@ tags: azure-resource-manager
8
8
ms.service: key-vault
9
9
ms.subservice: general
10
10
ms.topic: how-to
11
-
ms.date: 11/11/2019
11
+
ms.date: 01/11/2023
12
12
ms.author: mbaldwin
13
13
14
14
---
15
15
# Use Logic Apps to receive email about status changes of key vault secrets
16
16
17
-
In this guide you will learn how to respond to Azure Key Vault events that are received via [Azure Event Grid](../../event-grid/index.yml) by using [Azure Logic Apps](../../logic-apps/index.yml). By the end, you will have an Azure logic app set up to send a notification email every time a secret is created in Azure Key Vault.
17
+
In this guide, you will learn how to respond to Azure Key Vault events that are received via [Azure Event Grid](../../event-grid/index.yml) by using [Azure Logic Apps](../../logic-apps/index.yml). By the end, you will have an Azure logic app set up to send a notification email every time a secret is created in Azure Key Vault.
18
18
19
19
For an overview of Azure Key Vault / Azure Event Grid integration, see [Monitoring Key Vault with Azure Event Grid](event-grid-overview.md).
20
20
@@ -27,16 +27,16 @@ For an overview of Azure Key Vault / Azure Event Grid integration, see [Monitori
27
27
28
28
## Create a Logic App via Event Grid
29
29
30
-
First, create Logic App with event grid handler and subscribe to Azure Key Vault "SecretNewVersionCreated" events.
30
+
First, create Logic App with Event Grid handler and subscribe to Azure Key Vault "SecretNewVersionCreated" events.
31
31
32
32
To create an Azure Event Grid subscription, follow these steps:
33
33
34
-
1. In the Azure portal, go to your key vault, select **Events > Get Started** and click**Logic Apps**
34
+
1. In the Azure portal, go to your key vault, select **Events > Get Started** and select**Logic Apps**
Copy file name to clipboardExpand all lines: articles/key-vault/general/event-grid-overview.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,13 +1,13 @@
1
1
---
2
-
title: 'Monitoring Key Vault with Azure Event Grid'
3
-
description: 'Use Azure Event Grid to subscribe to Key Vault events'
2
+
title: Monitoring Key Vault with Azure Event Grid
3
+
description: Use Azure Event Grid to subscribe to Key Vault events
4
4
services: key-vault
5
5
author: msmbaldwin
6
6
7
7
ms.service: key-vault
8
8
ms.subservice: general
9
9
ms.topic: conceptual
10
-
ms.date: 11/12/2019
10
+
ms.date: 01/11/2023
11
11
ms.author: mbaldwin
12
12
---
13
13
@@ -19,7 +19,7 @@ Applications can react to these events using modern serverless architectures, wi
19
19
20
20
## Key Vault events and schemas
21
21
22
-
Event grid uses [event subscriptions](../../event-grid/concepts.md#event-subscriptions) to route event messages to subscribers. Key Vault events contain all the information you need to respond to changes in your data. You can identify a Key Vault event because the eventType property starts with "Microsoft.KeyVault".
22
+
Event Grid uses [event subscriptions](../../event-grid/concepts.md#event-subscriptions) to route event messages to subscribers. Key Vault events contain all the information you need to respond to changes in your data. You can identify a Key Vault event because the eventType property starts with "Microsoft.KeyVault".
23
23
24
24
For more information, see the [Key Vault event schema](../../event-grid/event-schema-key-vault.md).
25
25
@@ -30,8 +30,8 @@ For more information, see the [Key Vault event schema](../../event-grid/event-sc
30
30
31
31
Applications that handle Key Vault events should follow a few recommended practices:
32
32
33
-
* Multiple subscriptions can be configured to route events to the same event handler. It is important not to assume events are from a particular source, but to check the topic of the message to ensure that it comes from the key vault you are expecting.
34
-
* Similarly, check that the eventType is one you are prepared to process, and do not assume that all events you receive will be the types you expect.
33
+
* Multiple subscriptions can be configured to route events to the same event handler. It's important not to assume events are from a particular source, but to check the topic of the message to ensure that it comes from the key vault you're expecting.
34
+
* Similarly, check that the eventType is one you're prepared to process, and do not assume that all events you receive will be the types you expect.
35
35
* Ignore fields you don't understand. This practice will help keep you resilient to new features that might be added in the future.
36
36
* Use the "subject" prefix and suffix matches to limit events to a particular event.
You can now reference the key that you created or uploaded to Azure Key Vault, by using its URI. Use `https://ContosoKeyVault.vault.azure.net/keys/ContosoFirstKey` to always get the current version. Use https://[keyvault-name].vault.azure.net/keys/[keyname]/[key-unique-id] to get this specific version. For example, `https://ContosoKeyVault.vault.azure.net/keys/ContosoFirstKey/cgacf4f763ar42ffb0a1gca546aygd87`.
146
+
You can now reference the key that you created or uploaded to Azure Key Vault, by using its URI. Use `https://ContosoKeyVault.vault.azure.net/keys/ContosoFirstKey` to always get the current version. Use `https://<keyvault-name>.vault.azure.net/keys/<keyname>/<key-unique-id>` to get this specific version. For example, `https://ContosoKeyVault.vault.azure.net/keys/ContosoFirstKey/cgacf4f763ar42ffb0a1gca546aygd87`.
147
147
148
-
Add a secret to the vault, which is a password named SQLPassword, and that has the value of "hVFkk965BuUv" to Azure Key Vaults.
148
+
Add a secret to the vault, which is a password named SQLPassword, and that has the value of "hVFkk965BuUv" to Azure Key Vaults.
149
149
150
150
```azurecli
151
151
az keyvault secret set --vault-name "ContosoKeyVault" --name "SQLPassword" --value "hVFkk965BuUv "
152
152
```
153
153
154
-
Reference this password by using its URI. Use **https://ContosoVault.vault.azure.net/secrets/SQLPassword** to always get the current version, and https://[keyvault-name].vault.azure.net/secret/[secret-name]/[secret-unique-id] to get this specific version. For example, **https://ContosoVault.vault.azure.net/secrets/SQLPassword/90018dbb96a84117a0d2847ef8e7189d**.
154
+
Reference this password by using its URI. Use **https://ContosoVault.vault.azure.net/secrets/SQLPassword** to always get the current version, and `https://<keyvault-name>.vault.azure.net/secret/<secret-name>/<secret-unique-id>` to get this specific version. For example, `https://ContosoVault.vault.azure.net/secrets/SQLPassword/90018dbb96a84117a0d2847ef8e7189d`.
155
155
156
156
Import a certificate to the vault using a .pem or .pfx.
Copy file name to clipboardExpand all lines: articles/key-vault/general/overview-throttling.md
+8-7Lines changed: 8 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ author: msmbaldwin
7
7
ms.service: key-vault
8
8
ms.subservice: general
9
9
ms.topic: conceptual
10
-
ms.date: 12/02/2019
10
+
ms.date: 01/11/2023
11
11
ms.author: mbaldwin
12
12
13
13
---
@@ -20,19 +20,19 @@ Throttling limits vary based on the scenario. For example, if you are performing
20
20
21
21
## How does Key Vault handle its limits?
22
22
23
-
Service limits in Key Vault prevent misuse of resources and ensure quality of service for all of Key Vault's clients. When a service threshold is exceeded, Key Vault limits any further requests from that client for a period of time, returns HTTP status code 429 (Too many requests), and the request fails. Failed requests that return a 429 do not count towards the throttle limits tracked by Key Vault.
23
+
Service limits in Key Vault prevent misuse of resources and ensure quality of service for all of Key Vault's clients. When a service threshold is exceeded, Key Vault limits any further requests from that client, returns HTTP status code 429 (Too many requests), and the request fails. Failed requests that return a 429 do not count towards the throttle limits tracked by Key Vault.
24
24
25
-
Key Vault was originally designed to be used to store and retrieve your secrets at deployment time. The world has evolved, and Key Vault is being used at run-time to store and retrieve secrets, and often apps and services want to use Key Vault like a database. Current limits do not support high throughput rates.
25
+
Key Vault was originally designed to store and retrieve your secrets at deployment time. The world has evolved, and Key Vault is being used at run-time to store and retrieve secrets, and often apps and services want to use Key Vault like a database. Current limits do not support high throughput rates.
26
26
27
27
Key Vault was originally created with the limits specified in [Azure Key Vault service limits](service-limits.md). To maximize your Key Vault throughput rates, here are some recommended guidelines/best practices for maximizing your throughput:
28
-
1. Ensure you have throttling in place. Client must honor exponential back-off policies for 429's and ensure you are doing retries as per the guidance below.
28
+
1. Ensure you have throttling in place. Client must honor exponential back-off policies for 429s and ensure you are doing retries as per the guidance below.
29
29
1. Divide your Key Vault traffic amongst multiple vaults and different regions. Use a separate vault for each security/availability domain. If you have five apps, each in two regions, then we recommend 10 vaults each containing the secrets unique to app and region. A subscription-wide limit for all transaction types is five times the individual key vault limit. For example, HSM-other transactions per subscription are limited to 5,000 transactions in 10 seconds per subscription. Consider caching the secret within your service or app to also reduce the RPS directly to key vault and/or handle burst based traffic. You can also divide your traffic amongst different regions to minimize latency and use a different subscription/vault. Do not send more than the subscription limit to the Key Vault service in a single Azure region.
30
30
1. Cache the secrets you retrieve from Azure Key Vault in memory, and reuse from memory whenever possible. Re-read from Azure Key Vault only when the cached copy stops working (e.g. because it got rotated at the source).
31
-
1. Key Vault is designed for your own services secrets. If you are storing your customers' secrets (especially for high-throughput key storage scenarios), consider putting the keys in a database or storage account with encryption, and storing just the master key in Azure Key Vault.
31
+
1. Key Vault is designed for your own services secrets. If you are storing your customers' secrets (especially for high-throughput key storage scenarios), consider putting the keys in a database or storage account with encryption, and storing just the primary key in Azure Key Vault.
32
32
1. Encrypt, wrap, and verify public-key operations can be performed with no access to Key Vault, which not only reduces risk of throttling, but also improves reliability (as long as you properly cache the public key material).
33
33
1. If you use Key Vault to store credentials for a service, check if that service supports Azure AD Authentication to authenticate directly. This reduces the load on Key Vault, improves reliability and simplifies your code since Key Vault can now use the Azure AD token. Many services have moved to using Azure AD Auth. See the current list at [Services that support managed identities for Azure resources](../../active-directory/managed-identities-azure-resources/services-support-managed-identities.md#azure-services-that-support-managed-identities-for-azure-resources).
34
34
1. Consider staggering your load/deployment over a longer period of time to stay under the current RPS limits.
35
-
1. If your app comprises multiple nodes that need to read the same secret(s), then consider using a fanout pattern, where one entity reads the secret from Key Vault, and fans out to all nodes. Cache the retrieved secrets only in memory.
35
+
1. If your app comprises multiple nodes that need to read the same secret(s), then consider using a fan-out pattern, where one entity reads the secret from Key Vault, and fans out to all nodes. Cache the retrieved secrets only in memory.
36
36
37
37
38
38
## How to throttle your app in response to service limits
@@ -45,7 +45,8 @@ The following are **best practices** you should implement when your service is t
45
45
46
46
When you implement your app's error handling, use the HTTP error code 429 to detect the need for client-side throttling. If the request fails again with an HTTP 429 error code, you are still encountering an Azure service limit. Continue to use the recommended client-side throttling method, retrying the request until it succeeds.
47
47
48
-
Code that implements exponential backoff is shown below.
48
+
Here is code that implements exponential backoff:
49
+
49
50
```
50
51
SecretClientOptions options = new SecretClientOptions()
0 commit comments