You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/key-vault/certificates/about-certificates.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -110,10 +110,10 @@ The following table represents the mapping of x509 key usage policy to effective
110
110
|----------|--------|--------|
111
111
|DataEncipherment|encrypt, decrypt| N/A |
112
112
|DecipherOnly|decrypt| N/A |
113
-
|DigitalSignature|sign, verify| Key Vault default without a usage specification at certificate creation time |
113
+
|DigitalSignature|sign, verify| Key Vault default without a usage specification at certificate creation time |
114
114
|EncipherOnly|encrypt| N/A |
115
115
|KeyCertSign|sign, verify|N/A|
116
-
|KeyEncipherment|wrapKey, unwrapKey| Key Vault default without a usage specification at certificate creation time |
116
+
|KeyEncipherment|wrapKey, unwrapKey| Key Vault default without a usage specification at certificate creation time |
117
117
|NonRepudiation|sign, verify| N/A |
118
118
|crlsign|sign, verify| N/A |
119
119
@@ -134,7 +134,7 @@ Before a certificate issuer can be created in a Key Vault, following prerequisit
134
134
135
135
- An organization administrator must on-board their company (ex. Contoso) with at least one CA provider.
136
136
137
-
2. Admin creates requester credentials for Key Vault to enroll (and renew) TLS/SSL certificates
137
+
1. Admin creates requester credentials for Key Vault to enroll (and renew) TLS/SSL certificates
138
138
139
139
- Provides the configuration to be used to create an issuer object of the provider in the key vault
140
140
@@ -155,7 +155,6 @@ Certificate contacts contain contact information to send notifications triggered
155
155
156
156
Access control for certificates is managed by Key Vault, and is provided by the Key Vault that contains those certificates. The access control policy for certificates is distinct from the access control policies for keys and secrets in the same Key Vault. Users may create one or more vaults to hold certificates, to maintain scenario appropriate segmentation and management of certificates. For more information on certificate access control, see [here](certificate-access-control.md)
157
157
158
-
159
158
## Certificate Use Cases
160
159
161
160
### Secure communication and authentication
@@ -166,6 +165,7 @@ TLS certificates can help encrypt communications over the internet and establish
166
165
* Cloud/Multi-Cloud: secure cloud-based applications on-prem, cross-cloud, or in your cloud provider's tenant.
167
166
168
167
### Code signing
168
+
169
169
A certificate can help secure the code/script of software, thereby ensuring that the author can share the software over the internet without being changed by malicious entities. Furthermore, once the author signs the code using a certificate leveraging the code signing technology, the software is marked with a stamp of authentication displaying the author and their website. Therefore, the certificate used in code signing helps validate the software's authenticity, promoting end-to-end security.
Copy file name to clipboardExpand all lines: articles/key-vault/general/howto-logging.md
+21-5Lines changed: 21 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,13 +30,29 @@ What is logged:
30
30
31
31
## Prerequisites
32
32
33
-
To complete this tutorial, you must have the following:
33
+
To complete this tutorial, you will need an Azure key vault. You can create a new key vault using one of these methods:
34
+
-[Create a key vault using the Azure CLI](quick-create-cli.md)
35
+
-[Create a key vault using Azure PowerShell](quick-create-powershell.md)
36
+
-[Create a key vault using the Azure portal](quick-create-portal.md)
37
+
38
+
You will also need a destination for your logs. This can be an existing or new Azure storage account and/or Log Analytics workspace.
39
+
40
+
> [!IMPORTANT]
41
+
> If you use an existing Azure storage account or Log Analytics workspace, it must be in the same subscription as your key vault. It must also use the Azure Resource Manager deployment model, rather than the classic deployment model.
42
+
>
43
+
> If you create a new Azure storage account or Log Analytics workspace, we recommend you create it in the same resource group as your key vault, for ease of management.
44
+
45
+
You can create a new Azure storage account using one of these methods:
46
+
-[Create a storage account using the Azure CLI](../../storage/common/storage-account-create.md?tabs=azure-cli)
47
+
-[Create a storage account using Azure PowerShell](../../storage/common/storage-account-create.md?tabs=azure-powershell)
48
+
-[Create a storage account using the Azure portal](../../storage/common/storage-account-create.md?tabs=azure-portal)
49
+
50
+
You can create a new Log Analytics workspace using one of these methods:
51
+
-[Create a Log Analytics workspace using the Azure CLI](../../azure-monitor/logs/quick-create-workspace.md?tabs=azure-cli)
52
+
-[Create a Log Analytics workspace using Azure PowerShell](../../azure-monitor/logs/quick-create-workspace.md?tabs=azure-powershell)
53
+
-[Create a Log Analytics workspace the Azure portal](../../azure-monitor/logs/quick-create-workspace.md?tabs=azure-portal)
0 commit comments