Skip to content

Commit 4f65804

Browse files
Merge pull request #268434 from msmbaldwin/ade-fips
Removing nCipher to reflect our multiple HSM vendors
2 parents 46a513e + 86e1398 commit 4f65804

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

articles/key-vault/general/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Access to a key vault requires proper authentication and authorization before a
4141

4242
Authentication is done via Microsoft Entra ID. Authorization may be done via Azure role-based access control (Azure RBAC) or Key Vault access policy. Azure RBAC can be used for both management of the vaults and to access data stored in a vault, while key vault access policy can only be used when attempting to access data stored in a vault.
4343

44-
Azure Key Vaults may be either software-protected or, with the Azure Key Vault Premium tier, hardware-protected by hardware security modules (HSMs). Software-protected keys, secrets, and certificates are safeguarded by Azure, using industry-standard algorithms and key lengths. For situations where you require added assurance, you can import or generate keys in HSMs that never leave the HSM boundary. Azure Key Vault uses nCipher HSMs, which are [Federal Information Processing Standards 140 validated](/azure/key-vault/keys/about-keys#compliance). You can use HSM vendor provided tools to move a key from your HSM to Azure Key Vault.
44+
Azure Key Vaults may be either software-protected or, with the Azure Key Vault Premium tier, hardware-protected by hardware security modules (HSMs). Software-protected keys, secrets, and certificates are safeguarded by Azure, using industry-standard algorithms and key lengths. For situations where you require added assurance, you can import or generate keys in HSMs that never leave the HSM boundary. Azure Key Vault uses [Federal Information Processing Standard 140 validated HSMs](/azure/key-vault/keys/about-keys#compliance). You can use HSM vendor provided tools to move a key from your HSM to Azure Key Vault.
4545

4646
Finally, Azure Key Vault is designed so that Microsoft doesn't see or extract your data.
4747

articles/key-vault/keys/about-keys-details.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -109,8 +109,8 @@ For more information on JWK objects, see [JSON Web Key (JWK)](https://tools.ietf
109109

110110
Key vault key auto-rotation can be set by configuring key auto-rotation policy. It is only available on Key Vault resource.
111111

112-
- **Get Rotation Policy**: Retrieve rotation policy configuration
113-
- **Set Rotation Policy**: Set rotation policy configuration
112+
- **Get Rotation Policy**: Retrieve rotation policy configuration.
113+
- **Set Rotation Policy**: Set rotation policy configuration.
114114

115115
## Key attributes
116116

@@ -126,7 +126,7 @@ There are more read-only attributes that are included in any response that inclu
126126
- *updated*: IntDate, optional. The *updated* attribute indicates when this version of the key was updated. The value is null for keys that were last updated prior to the addition of this attribute. Its value MUST be a number containing an IntDate value.
127127
- *hsmPlatform*: string, optional. The underlying HSM Platform that is protecting a key.
128128
- A hsmPlatform value of 2 means the key is protected by our latest FIPS 140 Level 3 validated HSM platform.
129-
- A hsmPlatform value of 1 means the key is protected by our previous FIPS 140 Level 2 HSM platform using nCipher HSMs.
129+
- A hsmPlatform value of 1 means the key is protected by our previous FIPS 140 Level 2 validated HSM platform.
130130
- A hsmPlatform value of 0 means the key is protected by a FIPS 140 Level 1 HSM software cryptographic module.
131131
- if this is not set by a Managed HSM pool, it is protected by our latest FIPS 140 Level 3 validated HSM platform.
132132

0 commit comments

Comments
 (0)