You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/key-vault/key-vault-get-started.md
+1-4Lines changed: 1 addition & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,9 +25,6 @@ This article helps you get started with Azure Key Vault using PowerShell and wal
25
25
26
26
Azure Key Vault is available in most regions. For more information, see the [Key Vault pricing page](https://azure.microsoft.com/pricing/details/key-vault/).
27
27
28
-
> [!NOTE]
29
-
> This article does not include instructions on how to write an Azure application. You can use the [Azure Key Vault sample application](https://www.microsoft.com/download/details.aspx?id=45343) for these steps.
30
-
31
28
For Cross-Platform Command-Line Interface instructions, see [this equivalent tutorial](key-vault-manage-with-cli2.md).
32
29
33
30
## Requirements
@@ -266,7 +263,7 @@ To change the authorization of an application to use keys or secrets:
266
263
## <aid="HSM"></a>Working with a hardware security module (HSM)
267
264
For added assurance, you can import or generate keys in hardware security modules (HSMs) that never leave the HSM boundary. The HSMs are FIPS 140-2 Level 2 validated. If this requirement doesn't apply to you, skip this section and go to [Delete the key vault and associated keys and secrets](#delete).
268
265
269
-
To create these HSM-protected keys, you must use the [Azure Key Vault Premium service tier to support HSM-protected keys](https://azure.microsoft.com/pricing/free-trial/). In addition, note that this functionality is not available for Azure China.
266
+
To create these HSM-protected keys, you must use the [Azure Key Vault Premium service tier to support HSM-protected keys](https://azure.microsoft.com/pricing/details/key-vault/). In addition, note that this functionality is not available for Azure China.
270
267
271
268
When you create the key vault, add the **-SKU** parameter:
Copy file name to clipboardExpand all lines: articles/key-vault/key-vault-overview.md
+7-8Lines changed: 7 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,13 +26,12 @@ You have passwords, connection strings, and other pieces of information that are
26
26
27
27
Key Vault allows you to create multiple secure containers, called vaults. These vaults are backed by hardware security modules (HSMs). Vaults help reduce the chances of accidental loss of security information by centralizing the storage of application secrets. Key Vaults also control and log the access to anything stored in them. Azure Key Vault can handle requesting and renewing Transport Layer Security (TLS) certificates, providing the features required for a robust certificate lifecycle management solution.
28
28
29
-
Azure Key vault is designed to support application keys and secrets. Key Vault is not intended to be used as a store for user passwords.
30
-
29
+
Azure Key vault is designed to support any type of secret. By this we mean Key Vault can be used to store passwords, database credentials, API keys and, certificates, which can be either software protected or HSM protected
31
30
## Why use Azure Key Vault?
32
31
33
32
### Centralize application secrets
34
33
35
-
Centralizing storage of application secrets in Azure Key Vault allows you to control their distribution. This greatly reduces the chances that secrets may be accidentally leaked. When using Key Vault, application developers no longer need to store security information in their application. This eliminates the need to make this information part of the code. For example, an application may need to connect to a database. Instead of storing the connection string in the app codes, store it securely in Key Vault.
34
+
Centralizing storage of application secrets in Azure Key Vault allows you to control their distribution. Key Vault greatly reduces the chances that secrets may be accidentally leaked. When using Key Vault, application developers no longer need to store security information in their application. This eliminates the need to make this information part of the code. For example, an application may need to connect to a database. Instead of storing the connection string in the app codes, store it securely in Key Vault.
36
35
37
36
Your applications can securely access the information they need by using URIs that allow them to retrieve specific versions of a secret after the application’s key or secret is stored in Azure Key Vault. This happens without having to write custom code to protect any of the secret information.
38
37
@@ -50,7 +49,7 @@ Finally, Azure Key Vault is designed so that Microsoft does not see or extract y
50
49
51
50
### Monitor access and use
52
51
53
-
Once that you have created a couple of Key Vaults you will want to monitor how and when your keys and secrets are being accessed. You can do this by enabling logging for Key Vault. You can configure Azure Key Vault to:
52
+
Once you have created a couple of Key Vaults, you will want to monitor how and when your keys and secrets are being accessed. You can do this by enabling logging for Key Vault. You can configure Azure Key Vault to:
54
53
55
54
- Archive to a storage account.
56
55
- Stream to an event hub.
@@ -62,19 +61,19 @@ You have control over your logs and you may secure them by restricting access an
62
61
63
62
When storing valuable data, you must take several steps. Security information must be secured, it must follow a lifecycle, it must be highly available. Azure Key Vault simplifies a lot of this by:
64
63
65
-
- Removing the need for in-house knowledge of HSMs.
64
+
- Removing the need for in-house knowledge of Hardware Security Modules
66
65
- Scaling up on short notice to meet your organization’s usage spikes.
67
-
- Replicating the contents of your Key Vault within a region and to a secondary region. This ensures high availability and takes away the need of any action from the administrator to trigger the fail over.
66
+
- Replicating the contents of your Key Vault within a region and to a secondary region. Key Vault ensures high availability and takes away the need of any action from the administrator to trigger the failover.
68
67
- Providing standards Azure administration options via the portal, Azure CLI and PowerShell.
69
68
- Automating certain tasks on certificates that you purchase from Public CAs, such as enroll and renew.
70
69
71
70
In addition, Azure Key Vaults allow you to segregate application secrets. Applications may access only the vault that they are allowed to access, and they be limited to only perform specific operations. You can create an Azure Key Vault per application and restrict the secrets stored in a Key Vault to a specific application and team of developers.
72
71
73
72
### Integrate with other Azure services
74
73
75
-
As a secure store in Azure, Key Vault has been used to simplify scenarios like [Azure Disk Encryption](../security/azure-security-disk-encryption.md), the [always encrypted](https://docs.microsoft.com/sql/relational-databases/security/encryption/always-encrypted-database-engine) functionality in SQL server and Azure SQL, [Azure web apps](https://docs.microsoft.com/azure/app-service/web-sites-purchase-ssl-web-site). Key Vault itself can integrate with storage accounts, event hubs and log analytics.
74
+
As a secure store in Azure, Key Vault has been used to simplify scenarios like [Azure Disk Encryption](../security/azure-security-disk-encryption.md), the [always encrypted](https://docs.microsoft.com/sql/relational-databases/security/encryption/always-encrypted-database-engine) functionality in SQL server and Azure SQL, [Azure web apps](https://docs.microsoft.com/azure/app-service/web-sites-purchase-ssl-web-site). Key Vault itself can integrate with storage accounts, event hubs, and log analytics.
76
75
77
76
## Next steps
78
77
79
78
-[Quickstart: Create an Azure Key Vault using the CLI](quick-create-cli.md)
80
-
-[Configure an Azure web application to read a secret from Key vault](tutorial-web-application-keyvault.md)
79
+
-[Configure an Azure web application to read a secret from Key vault](tutorial-web-application-keyvault.md)
Copy file name to clipboardExpand all lines: articles/key-vault/quick-create-net.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Azure Quickstart - Configure an Azure web application to set and retrieve a secret from Key vault | Microsoft Docs
3
-
description: Quickstart showing how to configure an ASP.Net core application to set and retrieve a secret from Key vault
2
+
title: Quickstart- Set and retrieve a secret from Azure Key Vault using a Node Web App | Microsoft Docs
3
+
description: Quickstart- Set and retrieve a secret from Azure Key Vault using a Node Web App
4
4
services: key-vault
5
5
author: prashanthyv
6
6
manager: sumedhb
@@ -25,7 +25,7 @@ In this quickstart, you go over the necessary steps for getting an Azure web app
25
25
> *[Enable managed service identities](../active-directory/managed-service-identity/overview.md).
26
26
> * Grant the required permissions for the web application to read data from Key vault.
27
27
28
-
Before we go any further, read the [basic concepts](key-vault-whatis.md#basic-concepts) especially [Managed Service Identity](../active-directory/managed-service-identity/overview.md)
28
+
Before we go any further, please read the [basic concepts](key-vault-whatis.md#basic-concepts).
Copy file name to clipboardExpand all lines: articles/key-vault/quick-create-node.md
+4-6Lines changed: 4 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
-
title: Azure quickstart - Set and retrieve a secret from Azure Key Vault using a Node Web App | Microsoft Docs
3
-
description: In this quickstart you configure an Node.js application to set and retrieve a secret from Key vault
2
+
title: Quickstart- Set and retrieve a secret from Azure Key Vault using a Node Web App | Microsoft Docs
3
+
description: Quickstart- Set and retrieve a secret from Azure Key Vault using a Node Web App
4
4
services: key-vault
5
5
documentationcenter:
6
6
author: prashanthyv
@@ -17,7 +17,7 @@ ms.custom: mvc
17
17
18
18
# Quickstart: Set and retrieve a secret from Azure Key Vault using a Node Web App
19
19
20
-
This QuickStart shows how to store a secret in Key Vault and how to retrieve it using a Web app. This web app may be run locally or in Azure. The quickstart uses Node.js and Managed service identities (MSIs)
20
+
This quickstart shows you how to store a secret in Key Vault and how to retrieve it using a Web app. To see the secret value you would have to run this on Azure. The quickstart uses Node.js and Managed service identities (MSIs)
21
21
22
22
> [!div class="checklist"]
23
23
> * Create a Key Vault.
@@ -122,8 +122,6 @@ Below are the few steps we need to do
0 commit comments