Skip to content

Commit 6dbf356

Browse files
committed
Updates
1 parent fefa3c4 commit 6dbf356

File tree

6 files changed

+19
-19
lines changed

6 files changed

+19
-19
lines changed

articles/key-vault/general/authentication-requests-and-responses.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ tags: azure-resource-manager
99
ms.service: key-vault
1010
ms.subservice: general
1111
ms.topic: conceptual
12-
ms.date: 09/15/2020
12+
ms.date: 01/20/2023
1313
ms.author: mbaldwin
1414

1515
---

articles/key-vault/general/client-libraries.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,19 +8,19 @@ tags: azure-resource-manager
88
ms.service: key-vault
99
ms.subservice: general
1010
ms.topic: tutorial
11-
ms.date: 08/14/2020
11+
ms.date: 01/20/2023
1212
ms.author: mbaldwin
1313

1414

1515
---
1616

1717
# Client Libraries for Azure Key Vault
1818

19-
The client libraries for Azure Key Vault allow programmatic access to Key Vault functionality from a variety of languages, including .NET, Python, Java, and JavaScript.
19+
The client libraries for Azure Key Vault allow programmatic access to Key Vault functionality from a several languages, including .NET, Python, Java, and JavaScript.
2020

2121
## Client libraries per language and object
2222

23-
Each SDK has separate client libraries for key vault, secrets, keys, and certificates, per the table below.
23+
Each SDK has separate client libraries for key vault, secrets, keys, and certificates.
2424

2525
| Language | Secrets | Keys | Certificates | Key Vault (Management plane) |
2626
|--|--|--|--|--|

articles/key-vault/general/integrate-databricks-blob-storage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: msmbaldwin #Required; your GitHub user alias, with correct capitalizatio
55
ms.author: mbaldwin #Required; microsoft alias of author; optional team alias.
66
ms.service: key-vault #Required; service per approved list. service slug assigned to your service by ACOM.
77
ms.topic: tutorial
8-
ms.date: 06/16/2020 #Required; mm/dd/yyyy format.
8+
ms.date: 01/20/2023
99
---
1010

1111
# Tutorial: Access Azure Blob Storage using Azure Databricks and Azure Key Vault

articles/key-vault/general/logging.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8,16 +8,16 @@ tags: azure-resource-manager
88
ms.service: key-vault
99
ms.subservice: general
1010
ms.topic: how-to
11-
ms.date: 12/18/2020
11+
ms.date: 01/20/2023
1212
ms.author: mbaldwin
1313
#Customer intent: As an Azure Key Vault administrator, I want to enable logging so I can monitor how my key vaults are accessed.
1414
---
1515

1616
# Azure Key Vault logging
1717

18-
After you create one or more key vaults, you'll likely want to monitor how and when your key vaults are accessed, and by whom. You can do this by enabling logging for Azure Key Vault, which saves information in an Azure storage account that you provide. For step by step guidance on setting this up, see [How to enable Key Vault logging](howto-logging.md).
18+
After you create one or more key vaults, you'll likely want to monitor how and when your key vaults are accessed, and by whom. Enabling logging for Azure Key Vault saves this information in an Azure storage account that you provide. For step by step guidance, see [How to enable Key Vault logging](howto-logging.md).
1919

20-
You can access your logging information 10 minutes (at most) after the key vault operation. In most cases, it will be quicker than this. It's up to you to manage your logs in your storage account:
20+
You can access your logging information 10 minutes (at most) after the key vault operation. In most cases, it will be quicker. It's up to you to manage your logs in your storage account:
2121

2222
* Use standard Azure access control methods in your storage account to secure your logs by restricting who can access them.
2323
* Delete logs that you no longer want to keep in your storage account.
@@ -58,17 +58,17 @@ The following table lists the field names and descriptions:
5858
| Field name | Description |
5959
| --- | --- |
6060
| **time** |Date and time in UTC. |
61-
| **resourceId** |Azure Resource Manager resource ID. For Key Vault logs, this is always the Key Vault resource ID. |
61+
| **resourceId** |Azure Resource Manager resource ID. For Key Vault logs, it is always the Key Vault resource ID. |
6262
| **operationName** |Name of the operation, as documented in the next table. |
6363
| **operationVersion** |REST API version requested by the client. |
6464
| **category** |Type of result. For Key Vault logs, `AuditEvent` is the single, available value. |
6565
| **resultType** |Result of the REST API request. |
6666
| **resultSignature** |HTTP status. |
67-
| **resultDescription** |Additional description about the result, when available. |
68-
| **durationMs** |Time it took to service the REST API request, in milliseconds. This does not include the network latency, so the time you measure on the client side might not match this time. |
67+
| **resultDescription** |More description about the result, when available. |
68+
| **durationMs** |Time it took to service the REST API request, in milliseconds. The time does not include the network latency, so the time you measure on the client side might not match this time. |
6969
| **callerIpAddress** |IP address of the client that made the request. |
7070
| **correlationId** |An optional GUID that the client can pass to correlate client-side logs with service-side (Key Vault) logs. |
71-
| **identity** |Identity from the token that was presented in the REST API request. This is usually a "user," a "service principal," or the combination "user+appId," as in the case of a request that results from an Azure PowerShell cmdlet. |
71+
| **identity** | Identity from the token that was presented in the REST API request. Usually a "user," a "service principal," or the combination "user+appId", for instance when the request comes from a Azure PowerShell cmdlet. |
7272
| **properties** |Information that varies based on the operation (**operationName**). In most cases, this field contains client information (the user agent string passed by the client), the exact REST API request URI, and the HTTP status code. In addition, when an object is returned as a result of a request (for example, **KeyCreate** or **VaultGet**), it also contains the key URI (as `id`), vault URI, or secret URI. |
7373

7474
The **operationName** field values are in *ObjectVerb* format. For example:
@@ -190,9 +190,9 @@ The following table lists the **operationName** values and corresponding REST AP
190190

191191
You can use the Key Vault solution in Azure Monitor logs to review Key Vault `AuditEvent` logs. In Azure Monitor logs, you use log queries to analyze data and get the information you need.
192192

193-
For more information, including how to set this up, see [Azure Key Vault in Azure Monitor](../key-vault-insights-overview.md).
193+
For more information, including how to set it up, see [Azure Key Vault in Azure Monitor](../key-vault-insights-overview.md).
194194

195-
For understanding how to analyze logs, see [Sample kusto log queries](./monitor-key-vault.md#analyzing-logs)
195+
For understanding how to analyze logs, see [Sample Kusto log queries](./monitor-key-vault.md#analyzing-logs)
196196

197197
## Next steps
198198

articles/key-vault/general/move-subscription.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ tags: azure-resource-manager
88
ms.service: key-vault
99
ms.subservice: general
1010
ms.topic: how-to
11-
ms.date: 05/05/2020
11+
ms.date: 01/20/2023
1212
ms.author: mbaldwin
1313
ms.custom: devx-track-azurepowershell
1414
# Customer intent: As a key vault administrator, I want to move my vault to another subscription.
@@ -46,7 +46,7 @@ For more information about Azure Key Vault and Azure Active Directory, see
4646
> **Key Vaults used for disk encryption cannot be moved**
4747
> If you are using key vault with disk encryption for a VM, the key vault cannot be moved to a different resource group or a subscription while disk encryption is enabled. You must disable disk encryption prior to moving the key vault to a new resource group or subscription.
4848
49-
Some service principals (users and applications) are bound to a specific tenant. If you move your key vault to a subscription in another tenant, there is a chance that you will not be able to restore access to a specific service principal. Check to make sure that all essential service principals exist in the tenant where you are moving your key vault.
49+
Some service principals (users and applications) are bound to a specific tenant. If you move your key vault to a subscription in another tenant, there's a chance that you won't be able to restore access to a specific service principal. Check to make sure that all essential service principals exist in the tenant where you are moving your key vault.
5050

5151
## Prerequisites
5252

@@ -61,7 +61,7 @@ You can check existing roles using [Azure portal](../../role-based-access-contro
6161

6262
1. Sign in to the Azure portal at https://portal.azure.com.
6363
2. Navigate to your [key vault](overview.md)
64-
3. Click on the "Overview" tab
64+
3. Select on the "Overview" tab
6565
4. Select the "Move" button
6666
5. Select "Move to another subscription" from the dropdown options
6767
6. Select the resource group where you want to move your key vault
@@ -70,7 +70,7 @@ You can check existing roles using [Azure portal](../../role-based-access-contro
7070

7171
## Additional steps when subscription is in a new tenant
7272

73-
If you moved your key vault to a subscription in a new tenant, you need to manually update the tenant ID and remove old access policies and role assignments. Here are tutorials for these steps in PowerShell and Azure CLI. If you are using PowerShell, you may need to run the Clear-AzContext command documented below to allow you to see resources outside your current selected scope.
73+
If you moved your key vault to a subscription in a new tenant, you need to manually update the tenant ID and remove old access policies and role assignments. Here are tutorials for these steps in PowerShell and Azure CLI. If you are using PowerShell, you may need to run the Clear-AzContext command to allow you to see resources outside your current selected scope.
7474

7575
### Update tenant ID in a key vault
7676

articles/key-vault/general/rbac-migration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: msmbaldwin
66
ms.service: key-vault
77
ms.subservice: general
88
ms.topic: how-to
9-
ms.date: 8/30/2020
9+
ms.date: 01/20/2023
1010
ms.author: mbaldwin
1111

1212
---

0 commit comments

Comments
 (0)