Skip to content

Commit 316f56e

Browse files
committed
Changes
1 parent 9ffa73a commit 316f56e

File tree

4 files changed

+12
-15
lines changed

4 files changed

+12
-15
lines changed

.openpublishing.redirection.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3639,7 +3639,7 @@
36393639
},
36403640
{
36413641
"source_path": "articles/key-vault/about-keys-secrets-and-certificates.md",
3642-
"redirect_url": "/azure/key-vault",
3642+
"redirect_url": "/azure/key-vault/general/about-keys-secrets-certificates",
36433643
"redirect_document_id": false
36443644
},
36453645
{

articles/key-vault/general/about-keys-secrets-certificates.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ Azure Key Vault enables Microsoft Azure applications and users to store and use
2121
- Certificates: Supports certificates, which are built on top of keys and secrets and add an automated renewal feature. For more information, see [About certificates](../certificates/about-certificates.md).
2222
- Azure Storage: Can manage keys of an Azure Storage account for you. Internally, Key Vault can list (sync) keys with an Azure Storage Account, and regenerate (rotate) the keys periodically. For more information, see [Manage storage account keys with Key Vault](../secrets/overview-storage-keys.md).
2323

24-
For more general information about Key Vault, see [About Azure Key Vault](overview.md)
24+
For more general information about Key Vault, see [About Azure Key Vault](overview.md).
2525

2626
## Data types
2727

@@ -57,14 +57,12 @@ Where:
5757
|||
5858
|-|-|
5959
|`keyvault-name`|The name for a key vault in the Microsoft Azure Key Vault service.<br /><br /> Key Vault names are selected by the user and are globally unique.<br /><br /> Key Vault name must be a 3-24 character string, containing only 0-9, a-z, A-Z, and -.|
60-
|`object-type`|The type of the object, either "keys" or "secrets".|
60+
|`object-type`|The type of the object, "keys", "secrets", or 'certificates'.|
6161
|`object-name`|An `object-name` is a user provided name for and must be unique within a Key Vault. The name must be a 1-127 character string, containing only 0-9, a-z, A-Z, and -.|
62-
|`object-version`|An `object-version` is a system-generated, 32 character string identifier that is optionally used *o address a unique version of an object.|
62+
|`object-version`|An `object-version` is a system-generated, 32 character string identifier that is optionally used to address a unique version of an object.|
6363

6464
## Next steps
6565

66-
## See Also
67-
6866
- [About keys](../keys/about-keys.md)
6967
- [About secrets](../secrets/about-secrets.md)
7068
- [About certificates](../certificates/about-certificates.md)

articles/key-vault/keys/about-keys.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -46,33 +46,32 @@ Key Vault supports RSA keys of sizes 2048, 3072 and 4096. Key Vault supports Ell
4646

4747
The cryptographic modules that Key Vault uses, whether HSM or software, are FIPS (Federal Information Processing Standards) validated. You don't need to do anything special to run in FIPS mode. Keys **created** or **imported** as HSM-protected are processed inside an HSM, validated to FIPS 140-2 Level 2. Keys **created** or **imported** as software-protected, are processed inside cryptographic modules validated to FIPS 140-2 Level 1.
4848

49-
## EC algorithms
49+
### EC algorithms
5050
The following algorithm identifiers are supported with EC and EC-HSM keys in Key Vault.
5151

52-
### Curve Types
52+
#### Curve Types
5353

5454
- **P-256** - The NIST curve P-256, defined at [DSS FIPS PUB 186-4](https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf).
5555
- **P-256K** - The SEC curve SECP256K1, defined at [SEC 2: Recommended Elliptic Curve Domain Parameters](https://www.secg.org/sec2-v2.pdf).
5656
- **P-384** - The NIST curve P-384, defined at [DSS FIPS PUB 186-4](https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf).
5757
- **P-521** - The NIST curve P-521, defined at [DSS FIPS PUB 186-4](https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf).
5858

59-
### SIGN/VERIFY
59+
#### SIGN/VERIFY
6060

6161
- **ES256** - ECDSA for SHA-256 digests and keys created with curve P-256. This algorithm is described at [RFC7518](https://tools.ietf.org/html/rfc7518).
6262
- **ES256K** - ECDSA for SHA-256 digests and keys created with curve P-256K. This algorithm is pending standardization.
6363
- **ES384** - ECDSA for SHA-384 digests and keys created with curve P-384. This algorithm is described at [RFC7518](https://tools.ietf.org/html/rfc7518).
6464
- **ES512** - ECDSA for SHA-512 digests and keys created with curve P-521. This algorithm is described at [RFC7518](https://tools.ietf.org/html/rfc7518).
6565

66-
67-
## RSA algorithms
66+
### RSA algorithms
6867
The following algorithm identifiers are supported with RSA and RSA-HSM keys in Key Vault.
6968

70-
### WRAPKEY/UNWRAPKEY, ENCRYPT/DECRYPT
69+
#### WRAPKEY/UNWRAPKEY, ENCRYPT/DECRYPT
7170

7271
- **RSA1_5** - RSAES-PKCS1-V1_5 [RFC3447] key encryption
7372
- **RSA-OAEP** - RSAES using Optimal Asymmetric Encryption Padding (OAEP) [RFC3447], with the default parameters specified by RFC 3447 in Section A.2.1. Those default parameters are using a hash function of SHA-1 and a mask generation function of MGF1 with SHA-1.
7473

75-
### SIGN/VERIFY
74+
#### SIGN/VERIFY
7675

7776
- **PS256** - RSASSA-PSS using SHA-256 and MGF1 with SHA-256, as described in [RFC7518](https://tools.ietf.org/html/rfc7518).
7877
- **PS384** - RSASSA-PSS using SHA-384 and MGF1 with SHA-384, as described in [RFC7518](https://tools.ietf.org/html/rfc7518).

articles/key-vault/secrets/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,9 +44,9 @@
4444
href: tutorial-python-linux-virtual-machine.md
4545
- name: Managed Storage Account Keys
4646
items:
47-
- name: Manage storage accounts with CLI
47+
- name: Managed storage accounts with CLI
4848
href: overview-storage-keys.md
49-
- name: Manage storage accounts with PowerShell
49+
- name: Managed storage accounts with PowerShell
5050
href: overview-storage-keys-powershell.md
5151
- name: Fetch SAS tokens in code
5252
href: storage-keys-sas-tokens-code.md

0 commit comments

Comments
 (0)