Skip to content

Commit 5eb466f

Browse files
authored
Merge pull request #46811 from barclayn/keyvault-secrets
making changes based on customer feedback
2 parents 8099657 + 143962f commit 5eb466f

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/key-vault/key-vault-overview.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.tgt_pltfrm: na
1313
ms.devlang: na
1414
ms.topic: overview
1515
ms.custom: mvc
16-
ms.date: 05/08/2018
16+
ms.date: 07/17/2018
1717
ms.author: barclayn
1818
#Customer intent: As an IT Pro, Decision maker or developer I am trying to learn what Key Vault is and if it offers anything that could be used in my organization.
1919

@@ -36,17 +36,17 @@ Centralizing storage of application secrets in Azure Key Vault allows you to con
3636

3737
Your applications can securely access the information they need by using URIs that allow them to retrieve specific versions of a secret after the application’s key or secret is stored in Azure Key Vault. This happens without having to write custom code to protect any of the secret information.
3838

39-
### Securely store secrets
39+
### Securely store secrets and keys
4040

41-
Keys are safeguarded by Azure, using industry-standard algorithms, key lengths, and hardware security modules (HSMs). The HSMs used are Federal Information Processing Standards (FIPS) 140-2 Level 2 validated.
41+
Secrets and keys are safeguarded by Azure, using industry-standard algorithms, key lengths, and hardware security modules (HSMs). The HSMs used are Federal Information Processing Standards (FIPS) 140-2 Level 2 validated.
4242

4343
Access to a key vault requires proper authentication and authorization before a caller (user or application) can get access. Authentication establishes the identity of the caller, while authorization determines the operations that they are allowed to perform.
4444

4545
Authentication is done via Azure Active Directory. Authorization may be done via role-based access control (RBAC) or Key Vault access policy. RBAC is used when dealing with the management of the vaults and key vault access policy is used when attempting to access data stored in a vault.
4646

4747
Azure Key Vaults may be either software- or hardware-HSM protected. For situations where you require added assurance you can import or generate keys in hardware security modules (HSMs) that never leave the HSM boundary. Microsoft uses Thales hardware security modules. You can use Thales tools to move a key from your HSM to Azure Key Vault.
4848

49-
Finally, Azure Key Vault is designed so that Microsoft does not see or extract your keys.
49+
Finally, Azure Key Vault is designed so that Microsoft does not see or extract your data.
5050

5151
### Monitor access and use
5252

0 commit comments

Comments
 (0)