You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/key-vault/general/client-libraries.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,19 +8,19 @@ tags: azure-resource-manager
8
8
ms.service: key-vault
9
9
ms.subservice: general
10
10
ms.topic: tutorial
11
-
ms.date: 08/14/2020
11
+
ms.date: 01/20/2023
12
12
ms.author: mbaldwin
13
13
14
14
15
15
---
16
16
17
17
# Client Libraries for Azure Key Vault
18
18
19
-
The client libraries for Azure Key Vault allow programmatic access to Key Vault functionality from a variety of languages, including .NET, Python, Java, and JavaScript.
19
+
The client libraries for Azure Key Vault allow programmatic access to Key Vault functionality from a several languages, including .NET, Python, Java, and JavaScript.
20
20
21
21
## Client libraries per language and object
22
22
23
-
Each SDK has separate client libraries for key vault, secrets, keys, and certificates, per the table below.
23
+
Each SDK has separate client libraries for key vault, secrets, keys, and certificates.
Copy file name to clipboardExpand all lines: articles/key-vault/general/logging.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,16 +8,16 @@ tags: azure-resource-manager
8
8
ms.service: key-vault
9
9
ms.subservice: general
10
10
ms.topic: how-to
11
-
ms.date: 12/18/2020
11
+
ms.date: 01/20/2023
12
12
ms.author: mbaldwin
13
13
#Customer intent: As an Azure Key Vault administrator, I want to enable logging so I can monitor how my key vaults are accessed.
14
14
---
15
15
16
16
# Azure Key Vault logging
17
17
18
-
After you create one or more key vaults, you'll likely want to monitor how and when your key vaults are accessed, and by whom. You can do this by enabling logging for Azure Key Vault, which saves information in an Azure storage account that you provide. For step by step guidance on setting this up, see [How to enable Key Vault logging](howto-logging.md).
18
+
After you create one or more key vaults, you'll likely want to monitor how and when your key vaults are accessed, and by whom. Enabling logging for Azure Key Vaultsaves this information in an Azure storage account that you provide. For step by step guidance, see [How to enable Key Vault logging](howto-logging.md).
19
19
20
-
You can access your logging information 10 minutes (at most) after the key vault operation. In most cases, it will be quicker than this. It's up to you to manage your logs in your storage account:
20
+
You can access your logging information 10 minutes (at most) after the key vault operation. In most cases, it will be quicker. It's up to you to manage your logs in your storage account:
21
21
22
22
* Use standard Azure access control methods in your storage account to secure your logs by restricting who can access them.
23
23
* Delete logs that you no longer want to keep in your storage account.
@@ -58,17 +58,17 @@ The following table lists the field names and descriptions:
58
58
| Field name | Description |
59
59
| --- | --- |
60
60
|**time**|Date and time in UTC. |
61
-
|**resourceId**|Azure Resource Manager resource ID. For Key Vault logs, this is always the Key Vault resource ID. |
61
+
|**resourceId**|Azure Resource Manager resource ID. For Key Vault logs, it is always the Key Vault resource ID. |
62
62
|**operationName**|Name of the operation, as documented in the next table. |
63
63
|**operationVersion**|REST API version requested by the client. |
64
64
|**category**|Type of result. For Key Vault logs, `AuditEvent` is the single, available value. |
65
65
|**resultType**|Result of the REST API request. |
66
66
|**resultSignature**|HTTP status. |
67
-
|**resultDescription**|Additional description about the result, when available. |
68
-
|**durationMs**|Time it took to service the REST API request, in milliseconds. This does not include the network latency, so the time you measure on the client side might not match this time. |
67
+
|**resultDescription**|More description about the result, when available. |
68
+
|**durationMs**|Time it took to service the REST API request, in milliseconds. The time does not include the network latency, so the time you measure on the client side might not match this time. |
69
69
|**callerIpAddress**|IP address of the client that made the request. |
70
70
|**correlationId**|An optional GUID that the client can pass to correlate client-side logs with service-side (Key Vault) logs. |
71
-
|**identity**|Identity from the token that was presented in the REST API request. This is usually a "user," a "service principal," or the combination "user+appId," as in the case of a request that results from an Azure PowerShell cmdlet. |
71
+
|**identity**|Identity from the token that was presented in the REST API request. Usually a "user," a "service principal," or the combination "user+appId", for instance when the request comes from a Azure PowerShell cmdlet. |
72
72
|**properties**|Information that varies based on the operation (**operationName**). In most cases, this field contains client information (the user agent string passed by the client), the exact REST API request URI, and the HTTP status code. In addition, when an object is returned as a result of a request (for example, **KeyCreate** or **VaultGet**), it also contains the key URI (as `id`), vault URI, or secret URI. |
73
73
74
74
The **operationName** field values are in *ObjectVerb* format. For example:
@@ -190,9 +190,9 @@ The following table lists the **operationName** values and corresponding REST AP
190
190
191
191
You can use the Key Vault solution in Azure Monitor logs to review Key Vault `AuditEvent` logs. In Azure Monitor logs, you use log queries to analyze data and get the information you need.
192
192
193
-
For more information, including how to set this up, see [Azure Key Vault in Azure Monitor](../key-vault-insights-overview.md).
193
+
For more information, including how to set it up, see [Azure Key Vault in Azure Monitor](../key-vault-insights-overview.md).
194
194
195
-
For understanding how to analyze logs, see [Sample kusto log queries](./monitor-key-vault.md#analyzing-logs)
195
+
For understanding how to analyze logs, see [Sample Kusto log queries](./monitor-key-vault.md#analyzing-logs)
Copy file name to clipboardExpand all lines: articles/key-vault/general/move-subscription.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ tags: azure-resource-manager
8
8
ms.service: key-vault
9
9
ms.subservice: general
10
10
ms.topic: how-to
11
-
ms.date: 05/05/2020
11
+
ms.date: 01/20/2023
12
12
ms.author: mbaldwin
13
13
ms.custom: devx-track-azurepowershell
14
14
# Customer intent: As a key vault administrator, I want to move my vault to another subscription.
@@ -46,7 +46,7 @@ For more information about Azure Key Vault and Azure Active Directory, see
46
46
> **Key Vaults used for disk encryption cannot be moved**
47
47
> If you are using key vault with disk encryption for a VM, the key vault cannot be moved to a different resource group or a subscription while disk encryption is enabled. You must disable disk encryption prior to moving the key vault to a new resource group or subscription.
48
48
49
-
Some service principals (users and applications) are bound to a specific tenant. If you move your key vault to a subscription in another tenant, there is a chance that you will not be able to restore access to a specific service principal. Check to make sure that all essential service principals exist in the tenant where you are moving your key vault.
49
+
Some service principals (users and applications) are bound to a specific tenant. If you move your key vault to a subscription in another tenant, there's a chance that you won't be able to restore access to a specific service principal. Check to make sure that all essential service principals exist in the tenant where you are moving your key vault.
50
50
51
51
## Prerequisites
52
52
@@ -61,7 +61,7 @@ You can check existing roles using [Azure portal](../../role-based-access-contro
61
61
62
62
1. Sign in to the Azure portal at https://portal.azure.com.
63
63
2. Navigate to your [key vault](overview.md)
64
-
3.Click on the "Overview" tab
64
+
3.Select on the "Overview" tab
65
65
4. Select the "Move" button
66
66
5. Select "Move to another subscription" from the dropdown options
67
67
6. Select the resource group where you want to move your key vault
@@ -70,7 +70,7 @@ You can check existing roles using [Azure portal](../../role-based-access-contro
70
70
71
71
## Additional steps when subscription is in a new tenant
72
72
73
-
If you moved your key vault to a subscription in a new tenant, you need to manually update the tenant ID and remove old access policies and role assignments. Here are tutorials for these steps in PowerShell and Azure CLI. If you are using PowerShell, you may need to run the Clear-AzContext command documented below to allow you to see resources outside your current selected scope.
73
+
If you moved your key vault to a subscription in a new tenant, you need to manually update the tenant ID and remove old access policies and role assignments. Here are tutorials for these steps in PowerShell and Azure CLI. If you are using PowerShell, you may need to run the Clear-AzContext command to allow you to see resources outside your current selected scope.
0 commit comments