Skip to content

Commit 5aa40ee

Browse files
committed
Restored about keys secrets certs article
1 parent 7da1968 commit 5aa40ee

File tree

2 files changed

+9
-9
lines changed

2 files changed

+9
-9
lines changed

articles/key-vault/general/about-keys-secrets-certificates.md

Lines changed: 0 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -23,15 +23,6 @@ Azure Key Vault enables Microsoft Azure applications and users to store and use
2323

2424
For more general information about Key Vault, see [About Azure Key Vault](overview.md)
2525

26-
## Supporting standards
27-
28-
The JavaScript Object Notation (JSON) and JavaScript Object Signing and Encryption (JOSE) specifications are important background information.
29-
30-
- [JSON Web Key (JWK)](https://tools.ietf.org/html/draft-ietf-jose-json-web-key)
31-
- [JSON Web Encryption (JWE)](http://tools.ietf.org/html/draft-ietf-jose-json-web-encryption)
32-
- [JSON Web Algorithms (JWA)](http://tools.ietf.org/html/draft-ietf-jose-json-web-algorithms)
33-
- [JSON Web Signature (JWS)](https://tools.ietf.org/html/draft-ietf-jose-json-web-signature)
34-
3526
## Data types
3627

3728
Refer to the JOSE specifications for relevant data types for keys, encryption, and signing.

articles/key-vault/keys/about-keys.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,15 @@ Key Vault supports RSA and Elliptic Curve keys only.
3333

3434
Key Vault supports RSA keys of sizes 2048, 3072 and 4096. Key Vault supports Elliptic Curve key types P-256, P-384, P-521, and P-256K (SECP256K1).
3535

36+
## Supporting standards
37+
38+
The JavaScript Object Notation (JSON) and JavaScript Object Signing and Encryption (JOSE) specifications are important background information.
39+
40+
- [JSON Web Key (JWK)](https://tools.ietf.org/html/draft-ietf-jose-json-web-key)
41+
- [JSON Web Encryption (JWE)](http://tools.ietf.org/html/draft-ietf-jose-json-web-encryption)
42+
- [JSON Web Algorithms (JWA)](http://tools.ietf.org/html/draft-ietf-jose-json-web-algorithms)
43+
- [JSON Web Signature (JWS)](https://tools.ietf.org/html/draft-ietf-jose-json-web-signature)
44+
3645
## Cryptographic protection
3746

3847
The cryptographic modules that Key Vault uses, whether HSM or software, are FIPS (Federal Information Processing Standards) validated. You don't need to do anything special to run in FIPS mode. Keys **created** or **imported** as HSM-protected are processed inside an HSM, validated to FIPS 140-2 Level 2. Keys **created** or **imported** as software-protected, are processed inside cryptographic modules validated to FIPS 140-2 Level 1.

0 commit comments

Comments
 (0)