|
1 | 1 | ---
|
2 |
| -title: Quickstart - Azure Key Vault keys client library for .NET (version 4) |
3 |
| -description: Learn how to create, retrieve, and delete keys from an Azure key vault using the .NET client library (version 4) |
| 2 | +title: Quickstart - Azure Key Vault keys client library for .NET |
| 3 | +description: Learn how to create, retrieve, and delete keys from an Azure key vault using the .NET client library |
4 | 4 | author: msmbaldwin
|
5 | 5 | ms.author: mbaldwin
|
6 | 6 | ms.date: 01/04/2023
|
7 | 7 | ms.service: key-vault
|
8 | 8 | ms.subservice: keys
|
9 | 9 | ms.topic: quickstart
|
10 | 10 | ms.devlang: csharp
|
11 |
| -ms.custom: devx-track-csharp, devx-track-azurepowershell, mode-api |
| 11 | +ms.custom: devx-track-csharp, devx-track-azurepowershell, mode-api, passwordless-dotnet |
12 | 12 | ---
|
13 | 13 |
|
14 |
| -# Quickstart: Azure Key Vault key client library for .NET (SDK v4) |
| 14 | +# Quickstart: Azure Key Vault key client library for .NET |
15 | 15 |
|
16 | 16 | Get started with the Azure Key Vault key client library for .NET. [Azure Key Vault](../general/overview.md) is a cloud service that provides a secure store for cryptographic keys. You can securely store cryptographic keys, passwords, certificates, and other secrets. Azure key vaults may be created and managed through the Azure portal. In this quickstart, you learn how to create, retrieve, and delete keys from an Azure key vault using the .NET key client library
|
17 | 17 |
|
@@ -131,11 +131,9 @@ using Azure.Security.KeyVault.Keys;
|
131 | 131 |
|
132 | 132 | ### Authenticate and create a client
|
133 | 133 |
|
134 |
| -Application requests to most Azure services must be authorized. Using the [DefaultAzureCredential](/dotnet/azure/sdk/authentication#defaultazurecredential) class provided by the [Azure Identity client library](/dotnet/api/overview/azure/identity-readme) is the recommended approach for implementing passwordless connections to Azure services in your code. |
| 134 | +Application requests to most Azure services must be authorized. Using the [DefaultAzureCredential](/dotnet/azure/sdk/authentication#defaultazurecredential) class provided by the [Azure Identity client library](/dotnet/api/overview/azure/identity-readme) is the recommended approach for implementing passwordless connections to Azure services in your code. `DefaultAzureCredential` supports multiple authentication methods and determines which method should be used at runtime. This approach enables your app to use different authentication methods in different environments (local vs. production) without implementing environment-specific code. |
135 | 135 |
|
136 |
| -Some Azure services also allow you to authorize requests using passwords, connection strings, or other credentials directly. However, these options should be used with caution. Developers must be diligent to never expose these secrets in an unsecure location. Anyone who gains access to the password or secret key is able to authenticate. `DefaultAzureCredential` offers improved management and security benefits to allow passwordless authentication and avoid these types of issues. |
137 |
| - |
138 |
| -`DefaultAzureCredential` supports multiple authentication methods and determines which method should be used at runtime. This approach enables your app to use different authentication methods in different environments (local vs. production) without implementing environment-specific code. In this quickstart, `DefaultAzureCredential` authenticates to key vault using the credentials of the local development user logged into the Azure CLI. When the application is deployed to Azure, the same `DefaultAzureCredential` code can automatically discover and use a managed identity that is assigned to an App Service, Virtual Machine, or other services. For more information, see [Managed Identity Overview](/azure/active-directory/managed-identities-azure-resources/overview). |
| 136 | +In this quickstart, `DefaultAzureCredential` authenticates to key vault using the credentials of the local development user logged into the Azure CLI. When the application is deployed to Azure, the same `DefaultAzureCredential` code can automatically discover and use a managed identity that is assigned to an App Service, Virtual Machine, or other services. For more information, see [Managed Identity Overview](/azure/active-directory/managed-identities-azure-resources/overview). |
139 | 137 |
|
140 | 138 | In this example, the name of your key vault is expanded to the key vault URI, in the format `https://<your-key-vault-name>.vault.azure.net`. For more information about authenticating to key vault, see [Developer's Guide](/azure/key-vault/general/developers-guide#authenticate-to-key-vault-in-code).
|
141 | 139 |
|
|
0 commit comments