Skip to content

Commit b094959

Browse files
authored
Merge pull request #46771 from prashanthyv/master
Update the document to not include
2 parents 9db5595 + baa1603 commit b094959

File tree

5 files changed

+29
-41
lines changed

5 files changed

+29
-41
lines changed

articles/key-vault/key-vault-get-started.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,9 +25,6 @@ This article helps you get started with Azure Key Vault using PowerShell and wal
2525

2626
Azure Key Vault is available in most regions. For more information, see the [Key Vault pricing page](https://azure.microsoft.com/pricing/details/key-vault/).
2727

28-
> [!NOTE]
29-
> This article does not include instructions on how to write an Azure application. You can use the [Azure Key Vault sample application](https://www.microsoft.com/download/details.aspx?id=45343) for these steps.
30-
3128
For Cross-Platform Command-Line Interface instructions, see [this equivalent tutorial](key-vault-manage-with-cli2.md).
3229

3330
## Requirements
@@ -266,7 +263,7 @@ To change the authorization of an application to use keys or secrets:
266263
## <a id="HSM"></a>Working with a hardware security module (HSM)
267264
For added assurance, you can import or generate keys in hardware security modules (HSMs) that never leave the HSM boundary. The HSMs are FIPS 140-2 Level 2 validated. If this requirement doesn't apply to you, skip this section and go to [Delete the key vault and associated keys and secrets](#delete).
268265

269-
To create these HSM-protected keys, you must use the [Azure Key Vault Premium service tier to support HSM-protected keys](https://azure.microsoft.com/pricing/free-trial/). In addition, note that this functionality is not available for Azure China.
266+
To create these HSM-protected keys, you must use the [Azure Key Vault Premium service tier to support HSM-protected keys](https://azure.microsoft.com/pricing/details/key-vault/). In addition, note that this functionality is not available for Azure China.
270267

271268
When you create the key vault, add the **-SKU** parameter:
272269

articles/key-vault/key-vault-overview.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -26,13 +26,12 @@ You have passwords, connection strings, and other pieces of information that are
2626

2727
Key Vault allows you to create multiple secure containers, called vaults. These vaults are backed by hardware security modules (HSMs). Vaults help reduce the chances of accidental loss of security information by centralizing the storage of application secrets. Key Vaults also control and log the access to anything stored in them. Azure Key Vault can handle requesting and renewing Transport Layer Security (TLS) certificates, providing the features required for a robust certificate lifecycle management solution.
2828

29-
Azure Key vault is designed to support application keys and secrets. Key Vault is not intended to be used as a store for user passwords.
30-
29+
Azure Key vault is designed to support any type of secret. By this we mean Key Vault can be used to store passwords, database credentials, API keys and, certificates, which can be either software protected or HSM protected
3130
## Why use Azure Key Vault?
3231

3332
### Centralize application secrets
3433

35-
Centralizing storage of application secrets in Azure Key Vault allows you to control their distribution. This greatly reduces the chances that secrets may be accidentally leaked. When using Key Vault, application developers no longer need to store security information in their application. This eliminates the need to make this information part of the code. For example, an application may need to connect to a database. Instead of storing the connection string in the app codes, store it securely in Key Vault.
34+
Centralizing storage of application secrets in Azure Key Vault allows you to control their distribution. Key Vault greatly reduces the chances that secrets may be accidentally leaked. When using Key Vault, application developers no longer need to store security information in their application. This eliminates the need to make this information part of the code. For example, an application may need to connect to a database. Instead of storing the connection string in the app codes, store it securely in Key Vault.
3635

3736
Your applications can securely access the information they need by using URIs that allow them to retrieve specific versions of a secret after the application’s key or secret is stored in Azure Key Vault. This happens without having to write custom code to protect any of the secret information.
3837

@@ -50,7 +49,7 @@ Finally, Azure Key Vault is designed so that Microsoft does not see or extract y
5049

5150
### Monitor access and use
5251

53-
Once that you have created a couple of Key Vaults you will want to monitor how and when your keys and secrets are being accessed. You can do this by enabling logging for Key Vault. You can configure Azure Key Vault to:
52+
Once you have created a couple of Key Vaults, you will want to monitor how and when your keys and secrets are being accessed. You can do this by enabling logging for Key Vault. You can configure Azure Key Vault to:
5453

5554
- Archive to a storage account.
5655
- Stream to an event hub.
@@ -62,19 +61,19 @@ You have control over your logs and you may secure them by restricting access an
6261

6362
When storing valuable data, you must take several steps. Security information must be secured, it must follow a lifecycle, it must be highly available. Azure Key Vault simplifies a lot of this by:
6463

65-
- Removing the need for in-house knowledge of HSMs.
64+
- Removing the need for in-house knowledge of Hardware Security Modules
6665
- Scaling up on short notice to meet your organization’s usage spikes.
67-
- Replicating the contents of your Key Vault within a region and to a secondary region. This ensures high availability and takes away the need of any action from the administrator to trigger the fail over.
66+
- Replicating the contents of your Key Vault within a region and to a secondary region. Key Vault ensures high availability and takes away the need of any action from the administrator to trigger the failover.
6867
- Providing standards Azure administration options via the portal, Azure CLI and PowerShell.
6968
- Automating certain tasks on certificates that you purchase from Public CAs, such as enroll and renew.
7069

7170
In addition, Azure Key Vaults allow you to segregate application secrets. Applications may access only the vault that they are allowed to access, and they be limited to only perform specific operations. You can create an Azure Key Vault per application and restrict the secrets stored in a Key Vault to a specific application and team of developers.
7271

7372
### Integrate with other Azure services
7473

75-
As a secure store in Azure, Key Vault has been used to simplify scenarios like [Azure Disk Encryption](../security/azure-security-disk-encryption.md), the [always encrypted]( https://docs.microsoft.com/sql/relational-databases/security/encryption/always-encrypted-database-engine) functionality in SQL server and Azure SQL, [Azure web apps]( https://docs.microsoft.com/azure/app-service/web-sites-purchase-ssl-web-site). Key Vault itself can integrate with storage accounts, event hubs and log analytics.
74+
As a secure store in Azure, Key Vault has been used to simplify scenarios like [Azure Disk Encryption](../security/azure-security-disk-encryption.md), the [always encrypted]( https://docs.microsoft.com/sql/relational-databases/security/encryption/always-encrypted-database-engine) functionality in SQL server and Azure SQL, [Azure web apps]( https://docs.microsoft.com/azure/app-service/web-sites-purchase-ssl-web-site). Key Vault itself can integrate with storage accounts, event hubs, and log analytics.
7675

7776
## Next steps
7877

7978
- [Quickstart: Create an Azure Key Vault using the CLI](quick-create-cli.md)
80-
- [Configure an Azure web application to read a secret from Key vault](tutorial-web-application-keyvault.md)
79+
- [Configure an Azure web application to read a secret from Key vault](tutorial-web-application-keyvault.md)

articles/key-vault/quick-create-net.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Azure Quickstart - Configure an Azure web application to set and retrieve a secret from Key vault | Microsoft Docs
3-
description: Quickstart showing how to configure an ASP.Net core application to set and retrieve a secret from Key vault
2+
title: Quickstart- Set and retrieve a secret from Azure Key Vault using a Node Web App | Microsoft Docs
3+
description: Quickstart- Set and retrieve a secret from Azure Key Vault using a Node Web App
44
services: key-vault
55
author: prashanthyv
66
manager: sumedhb
@@ -25,7 +25,7 @@ In this quickstart, you go over the necessary steps for getting an Azure web app
2525
> * [Enable managed service identities](../active-directory/managed-service-identity/overview.md).
2626
> * Grant the required permissions for the web application to read data from Key vault.
2727
28-
Before we go any further, read the [basic concepts](key-vault-whatis.md#basic-concepts) especially [Managed Service Identity](../active-directory/managed-service-identity/overview.md)
28+
Before we go any further, please read the [basic concepts](key-vault-whatis.md#basic-concepts).
2929

3030
## Prerequisites
3131

articles/key-vault/quick-create-node.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Azure quickstart - Set and retrieve a secret from Azure Key Vault using a Node Web App | Microsoft Docs
3-
description: In this quickstart you configure an Node.js application to set and retrieve a secret from Key vault
2+
title: Quickstart- Set and retrieve a secret from Azure Key Vault using a Node Web App | Microsoft Docs
3+
description: Quickstart- Set and retrieve a secret from Azure Key Vault using a Node Web App
44
services: key-vault
55
documentationcenter:
66
author: prashanthyv
@@ -17,7 +17,7 @@ ms.custom: mvc
1717

1818
# Quickstart: Set and retrieve a secret from Azure Key Vault using a Node Web App
1919

20-
This QuickStart shows how to store a secret in Key Vault and how to retrieve it using a Web app. This web app may be run locally or in Azure. The quickstart uses Node.js and Managed service identities (MSIs)
20+
This quickstart shows you how to store a secret in Key Vault and how to retrieve it using a Web app. To see the secret value you would have to run this on Azure. The quickstart uses Node.js and Managed service identities (MSIs)
2121

2222
> [!div class="checklist"]
2323
> * Create a Key Vault.
@@ -122,8 +122,6 @@ Below are the few steps we need to do
122122
```
123123
# Bash
124124
az webapp create --resource-group myResourceGroup --plan myAppServicePlan --name <app_name> --runtime "NODE|6.9" --deployment-local-git
125-
# PowerShell
126-
az --% webapp create --resource-group myResourceGroup --plan myAppServicePlan --name <app_name> --runtime "NODE|6.9"
127125
```
128126
When the web app has been created, the Azure CLI shows output similar to the following example:
129127
```
@@ -199,4 +197,4 @@ Make sure that you replaced the name <YourKeyVaultName> with your vault name
199197
* [Azure Key Vault Home Page](https://azure.microsoft.com/services/key-vault/)
200198
* [Azure Key Vault Documentation](https://docs.microsoft.com/azure/key-vault/)
201199
* [Azure SDK For Node](https://docs.microsoft.com/javascript/api/overview/azure/key-vault)
202-
* [Azure REST API Reference](https://docs.microsoft.com/rest/api/keyvault/)
200+
* [Azure REST API Reference](https://docs.microsoft.com/rest/api/keyvault/)

articles/key-vault/toc.yml

Lines changed: 14 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,15 @@
4242
href: key-vault-ovw-storage-keys.md
4343
- name: Throttling
4444
href: key-vault-ovw-throttling.md
45+
- name: About keys, secrets and certificates
46+
href: about-keys-secrets-and-certificates.md
47+
items:
48+
- name: Get started with certificates
49+
href: certificate-scenarios.md
50+
- name: Certificate creation methods
51+
href: create-certificate.md
52+
- name: Monitor and manage certificate creation
53+
href: create-certificate-scenarios.md
4554
- name: How-to guides
4655
items:
4756
- name: Azure Key Vault logging
@@ -110,34 +119,19 @@
110119
items:
111120
- name: Service overview
112121
href: https://azure.microsoft.com/services/key-vault/
113-
- name: About keys, secrets and certificates
114-
href: about-keys-secrets-and-certificates.md
115-
items:
116-
- name: Get started with certificates
117-
href: certificate-scenarios.md
118-
- name: Certificate creation methods
119-
href: create-certificate.md
120-
- name: Monitor and manage certificate creation
121-
href: create-certificate-scenarios.md
122122
- name: Authentication, requests and responses
123123
href: authentication-requests-and-responses.md
124-
- name: Customer data features
124+
- name: Customer Data
125125
href: key-vault-customer-data.md
126126
- name: Common parameters and headers
127127
href: common-parameters-and-headers.md
128-
- name: Key Vault versions
128+
- name: Release Notes
129129
href: key-vault-versions.md
130-
- name: Azure roadmap
131-
href: https://azure.microsoft.com/roadmap/?category=security-identity
132-
- name: Blog
130+
- name: Azure Key Vault Blog
133131
href: http://blogs.technet.com/b/kv/
134-
- name: Code samples
135-
href: https://github.com/Azure-Samples?utf8=%E2%9C%93&q=key+vault&type=&language=
136-
- name: Forums
137-
href: https://social.msdn.microsoft.com/forums/azure/home?forum=AzureKeyVault
138132
- name: Pricing
139133
href: https://azure.microsoft.com/pricing/details/key-vault/
140-
- name: Pricing calculator
134+
- name: Pricing Calculator
141135
href: https://azure.microsoft.com/pricing/calculator/
142-
- name: Product feedback
136+
- name: Product Feedback
143137
href: https://feedback.azure.com/forums/906355-azure-key-vault

0 commit comments

Comments
 (0)