Skip to content

Commit c46d35b

Browse files
committed
Sync
1 parent 2eaaf9b commit c46d35b

File tree

5 files changed

+28
-12
lines changed

5 files changed

+28
-12
lines changed

articles/key-vault/certificates/about-certificates.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -110,10 +110,10 @@ The following table represents the mapping of x509 key usage policy to effective
110110
|----------|--------|--------|
111111
|DataEncipherment|encrypt, decrypt| N/A |
112112
|DecipherOnly|decrypt| N/A |
113-
|DigitalSignature|sign, verify| Key Vault default without a usage specification at certificate creation time |
113+
|DigitalSignature|sign, verify| Key Vault default without a usage specification at certificate creation time |
114114
|EncipherOnly|encrypt| N/A |
115115
|KeyCertSign|sign, verify|N/A|
116-
|KeyEncipherment|wrapKey, unwrapKey| Key Vault default without a usage specification at certificate creation time |
116+
|KeyEncipherment|wrapKey, unwrapKey| Key Vault default without a usage specification at certificate creation time |
117117
|NonRepudiation|sign, verify| N/A |
118118
|crlsign|sign, verify| N/A |
119119

@@ -134,7 +134,7 @@ Before a certificate issuer can be created in a Key Vault, following prerequisit
134134

135135
- An organization administrator must on-board their company (ex. Contoso) with at least one CA provider.
136136

137-
2. Admin creates requester credentials for Key Vault to enroll (and renew) TLS/SSL certificates
137+
1. Admin creates requester credentials for Key Vault to enroll (and renew) TLS/SSL certificates
138138

139139
- Provides the configuration to be used to create an issuer object of the provider in the key vault
140140

@@ -155,7 +155,6 @@ Certificate contacts contain contact information to send notifications triggered
155155

156156
Access control for certificates is managed by Key Vault, and is provided by the Key Vault that contains those certificates. The access control policy for certificates is distinct from the access control policies for keys and secrets in the same Key Vault. Users may create one or more vaults to hold certificates, to maintain scenario appropriate segmentation and management of certificates. For more information on certificate access control, see [here](certificate-access-control.md)
157157

158-
159158
## Certificate Use Cases
160159

161160
### Secure communication and authentication
@@ -166,6 +165,7 @@ TLS certificates can help encrypt communications over the internet and establish
166165
* Cloud/Multi-Cloud: secure cloud-based applications on-prem, cross-cloud, or in your cloud provider's tenant.
167166

168167
### Code signing
168+
169169
A certificate can help secure the code/script of software, thereby ensuring that the author can share the software over the internet without being changed by malicious entities. Furthermore, once the author signs the code using a certificate leveraging the code signing technology, the software is marked with a stamp of authentication displaying the author and their website. Therefore, the certificate used in code signing helps validate the software's authenticity, promoting end-to-end security.
170170

171171
## Next steps

articles/key-vault/certificates/tutorial-import-certificate.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ In this case, we will create a certificate called **ExampleCertificate**, or imp
5656

5757
# [Azure portal](#tab/azure-portal)
5858

59-
1. On the Key Vault properties pages, select **Certificates**.
59+
1. On the page for your key vault, select **Certificates**.
6060
2. Click on **Generate/Import**.
6161
3. On the **Create a certificate** screen choose the following values:
6262
- **Method of Certificate Creation**: Import.

articles/key-vault/general/howto-logging.md

Lines changed: 21 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -30,13 +30,29 @@ What is logged:
3030

3131
## Prerequisites
3232

33-
To complete this tutorial, you must have the following:
33+
To complete this tutorial, you will need an Azure key vault. You can create a new key vault using one of these methods:
34+
- [Create a key vault using the Azure CLI](quick-create-cli.md)
35+
- [Create a key vault using Azure PowerShell](quick-create-powershell.md)
36+
- [Create a key vault using the Azure portal](quick-create-portal.md)
37+
38+
You will also need a destination for your logs. This can be an existing or new Azure storage account and/or Log Analytics workspace.
39+
40+
> [!IMPORTANT]
41+
> If you use an existing Azure storage account or Log Analytics workspace, it must be in the same subscription as your key vault. It must also use the Azure Resource Manager deployment model, rather than the classic deployment model.
42+
>
43+
> If you create a new Azure storage account or Log Analytics workspace, we recommend you create it in the same resource group as your key vault, for ease of management.
44+
45+
You can create a new Azure storage account using one of these methods:
46+
- [Create a storage account using the Azure CLI](../../storage/common/storage-account-create.md?tabs=azure-cli)
47+
- [Create a storage account using Azure PowerShell](../../storage/common/storage-account-create.md?tabs=azure-powershell)
48+
- [Create a storage account using the Azure portal](../../storage/common/storage-account-create.md?tabs=azure-portal)
49+
50+
You can create a new Log Analytics workspace using one of these methods:
51+
- [Create a Log Analytics workspace using the Azure CLI](../../azure-monitor/logs/quick-create-workspace.md?tabs=azure-cli)
52+
- [Create a Log Analytics workspace using Azure PowerShell](../../azure-monitor/logs/quick-create-workspace.md?tabs=azure-powershell)
53+
- [Create a Log Analytics workspace the Azure portal](../../azure-monitor/logs/quick-create-workspace.md?tabs=azure-portal)
3454

35-
* An existing key vault that you have been using.
36-
* [Azure Cloud Shell](https://shell.azure.com) - Bash environment.
37-
* Sufficient storage on Azure for your Key Vault logs.
3855

39-
In this article, commands are formatted for [Cloud Shell](https://shell.azure.com) with Bash as an environment.
4056

4157
## Connect to your Key Vault subscription
4258

articles/key-vault/general/private-link-service.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,15 +50,15 @@ After configuring the key vault basics, select the Networking tab and follow the
5050
1. Click the "+ Add" Button to add a private endpoint.
5151

5252
![Screenshot that shows the 'Networking' tab on the 'Create key vault' page.](../media/private-link-service-1.png)
53-
53+
5454
1. In the "Location" field of the Create Private Endpoint Blade, select the region in which your virtual network is located.
5555
1. In the "Name" field, create a descriptive name that will allow you to identify this private endpoint.
5656
1. Select the virtual network and subnet you want this private endpoint to be created in from the dropdown menu.
5757
1. Leave the "integrate with the private zone DNS" option unchanged.
5858
1. Select "Ok".
5959

6060
![Screenshot that shows the 'Create private endpoint' page with settings selected.](../media/private-link-service-8.png)
61-
61+
6262
You will now be able to see the configured private endpoint. You now have the option to delete and edit this private endpoint.
6363
Select the "Review + Create" button and create the key vault. It will take 5-10 minutes for the deployment to complete.
6464

-9.31 KB
Loading

0 commit comments

Comments
 (0)