Skip to content

Commit fa560ed

Browse files
authored
Merge pull request #51152 from wwlpublish/61f0e0552556aebd3cab58c3637f07f7c7ed258660e91a15fd21ec95939cd237-live
Modules/M01-implement-azure-keyvault
2 parents 0fc5d34 + 08b7ca2 commit fa560ed

17 files changed

+230
-254
lines changed
Lines changed: 17 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,17 @@
1-
### YamlMime:ModuleUnit
2-
uid: learn.wwl.implement-azure-key-vault.introduction
3-
title: Introduction
4-
metadata:
5-
title: Introduction
6-
description: "Introduction"
7-
ms.date: 03/12/2024
8-
author: wwlpublish
9-
ms.author: jeffko
10-
ms.topic: unit
11-
ms.custom:
12-
- N/A
13-
durationInMinutes: 3
14-
content: |
15-
[!include[](includes/1-introduction.md)]
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.implement-azure-key-vault.introduction
3+
title: Introduction
4+
metadata:
5+
adobe-target: true
6+
prefetch-feature-rollout: true
7+
title: Introduction
8+
description: "Introduction"
9+
ms.date: 06/27/2025
10+
author: wwlpublish
11+
ms.author: jeffko
12+
ms.topic: unit
13+
ms.custom:
14+
- N/A
15+
durationInMinutes: 3
16+
content: |
17+
[!include[](includes/1-introduction.md)]
Lines changed: 17 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,17 @@
1-
### YamlMime:ModuleUnit
2-
uid: learn.wwl.implement-azure-key-vault.explore
3-
title: Explore Azure Key Vault
4-
metadata:
5-
title: Explore Azure Key Vault
6-
description: "Explore Azure Key Vault"
7-
ms.date: 03/12/2024
8-
author: wwlpublish
9-
ms.author: jeffko
10-
ms.topic: unit
11-
ms.custom:
12-
- N/A
13-
durationInMinutes: 3
14-
content: |
15-
[!include[](includes/2-key-vault-overview.md)]
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.implement-azure-key-vault.explore
3+
title: Explore Azure Key Vault
4+
metadata:
5+
adobe-target: true
6+
prefetch-feature-rollout: true
7+
title: Explore Azure Key Vault
8+
description: "Explore Azure Key Vault"
9+
ms.date: 06/27/2025
10+
author: wwlpublish
11+
ms.author: jeffko
12+
ms.topic: unit
13+
ms.custom:
14+
- N/A
15+
durationInMinutes: 3
16+
content: |
17+
[!include[](includes/2-key-vault-overview.md)]
Lines changed: 17 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,17 @@
1-
### YamlMime:ModuleUnit
2-
uid: learn.wwl.implement-azure-key-vault.discover-best-practices
3-
title: Discover Azure Key Vault best practices
4-
metadata:
5-
title: Discover Azure Key Vault best practices
6-
description: "Discover Azure Key Vault best practices"
7-
ms.date: 03/12/2024
8-
author: wwlpublish
9-
ms.author: jeffko
10-
ms.topic: unit
11-
ms.custom:
12-
- N/A
13-
durationInMinutes: 3
14-
content: |
15-
[!include[](includes/3-key-vault-concepts.md)]
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.implement-azure-key-vault.discover-best-practices
3+
title: Discover Azure Key Vault best practices
4+
metadata:
5+
adobe-target: true
6+
prefetch-feature-rollout: true
7+
title: Discover Azure Key Vault best practices
8+
description: "Discover Azure Key Vault best practices"
9+
ms.date: 06/27/2025
10+
author: wwlpublish
11+
ms.author: jeffko
12+
ms.topic: unit
13+
ms.custom:
14+
- N/A
15+
durationInMinutes: 3
16+
content: |
17+
[!include[](includes/3-key-vault-concepts.md)]
Lines changed: 17 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,17 @@
1-
### YamlMime:ModuleUnit
2-
uid: learn.wwl.implement-azure-key-vault.authenticate-to
3-
title: Authenticate to Azure Key Vault
4-
metadata:
5-
title: Authenticate to Azure Key Vault
6-
description: "Authenticate to Azure Key Vault"
7-
ms.date: 03/12/2024
8-
author: wwlpublish
9-
ms.author: jeffko
10-
ms.topic: unit
11-
ms.custom:
12-
- N/A
13-
durationInMinutes: 3
14-
content: |
15-
[!include[](includes/4-key-vault-authentication.md)]
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.implement-azure-key-vault.authenticate-to
3+
title: Authenticate to Azure Key Vault
4+
metadata:
5+
adobe-target: true
6+
prefetch-feature-rollout: true
7+
title: Authenticate to Azure Key Vault
8+
description: "Authenticate to Azure Key Vault"
9+
ms.date: 06/27/2025
10+
author: wwlpublish
11+
ms.author: jeffko
12+
ms.topic: unit
13+
ms.custom:
14+
- N/A
15+
durationInMinutes: 3
16+
content: |
17+
[!include[](includes/4-key-vault-authentication.md)]
Lines changed: 17 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,17 @@
1-
### YamlMime:ModuleUnit
2-
uid: learn.wwl.implement-azure-key-vault.exercise-set-retrieve-secret-from-by-using-azure-cli
3-
title: 'Exercise: Set and retrieve a secret from Azure Key Vault by using Azure CLI'
4-
metadata:
5-
title: 'Exercise: Set and retrieve a secret from Azure Key Vault by using Azure CLI'
6-
description: "Exercise: Set and retrieve a secret from Azure Key Vault by using Azure CLI"
7-
ms.date: 03/12/2024
8-
author: wwlpublish
9-
ms.author: jeffko
10-
ms.topic: unit
11-
ms.custom: N/A, devx-track-azurecli
12-
durationInMinutes: 3
13-
content: |
14-
[!include[](includes/5-set-retrieve-secret-azure-key-vault.md)]
15-
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.implement-azure-key-vault.exercise-set-retrieve-secret-from-by-using-azure-cli
3+
title: Exercise - Create and retrieve secrets from Azure Key Vault
4+
metadata:
5+
adobe-target: true
6+
prefetch-feature-rollout: true
7+
title: Exercise - Create and retrieve secrets from Azure Key Vault
8+
description: "Exercise - Create and retrieve secrets from Azure Key Vault"
9+
ms.date: 06/27/2025
10+
author: wwlpublish
11+
ms.author: jeffko
12+
ms.topic: unit
13+
ms.custom:
14+
- N/A
15+
durationInMinutes: 30
16+
content: |
17+
[!include[](includes/5-set-retrieve-secret-azure-key-vault.md)]
Lines changed: 40 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -1,39 +1,40 @@
1-
### YamlMime:ModuleUnit
2-
uid: learn.wwl.implement-azure-key-vault.knowledge-check
3-
title: Module assessment
4-
metadata:
5-
title: Module assessment
6-
description: "Knowledge check"
7-
ms.date: 03/12/2024
8-
author: wwlpublish
9-
ms.author: jeffko
10-
ms.topic: unit
11-
ms.custom:
12-
- N/A
13-
module_assessment: true
14-
durationInMinutes: 3
15-
quiz:
16-
title: "Check your knowledge"
17-
questions:
18-
- content: "Which of the below methods of authenticating to Azure Key Vault is recommended for most scenarios?"
19-
choices:
20-
- content: "Service principal and certificate"
21-
isCorrect: false
22-
explanation: "Incorrect. This method is not recommended because it is difficult to automatically rotate the bootstrap secret that's used to authenticate to Key Vault."
23-
- content: "Service principal and secret"
24-
isCorrect: false
25-
explanation: "Incorrect. This method is not recommended because the application owner or developer must rotate the certificate."
26-
- content: "Managed identities"
27-
isCorrect: true
28-
explanation: "Correct. The benefit of this approach is that Azure automatically rotates the identity."
29-
- content: "Azure Key Vault protects data when it's traveling between Azure Key Vault and clients. What protocol does it use for encryption?"
30-
choices:
31-
- content: "Secure Sockets Layer"
32-
isCorrect: false
33-
explanation: "Incorrect. The Secure Sockets Layer protocol has been replaced with the Transport Layer Security protocol."
34-
- content: "Transport Layer Security"
35-
isCorrect: true
36-
explanation: "Correct. Azure Key Vault enforces Transport Layer Security protocol to protect data when it’s traveling between Azure Key Vault and clients."
37-
- content: "Presentation Layer"
38-
isCorrect: false
39-
explanation: "Incorrect. Presentation Layer is part of the Open Systems Interconnection model and is not a security protocol."
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.implement-azure-key-vault.knowledge-check
3+
title: Module assessment
4+
metadata:
5+
adobe-target: true
6+
prefetch-feature-rollout: true
7+
title: Module assessment
8+
description: "Knowledge check"
9+
ms.date: 06/27/2025
10+
author: wwlpublish
11+
ms.author: jeffko
12+
ms.topic: unit
13+
ms.custom:
14+
- N/A
15+
durationInMinutes: 3
16+
quiz:
17+
title: "Check your knowledge"
18+
questions:
19+
- content: "Which of the below methods of authenticating to Azure Key Vault is recommended for most scenarios?"
20+
choices:
21+
- content: "Service principal and certificate"
22+
isCorrect: false
23+
explanation: "Incorrect. This method is not recommended because it is difficult to automatically rotate the bootstrap secret that's used to authenticate to Key Vault."
24+
- content: "Service principal and secret"
25+
isCorrect: false
26+
explanation: "Incorrect. This method is not recommended because the application owner or developer must rotate the certificate."
27+
- content: "Managed identities"
28+
isCorrect: true
29+
explanation: "Correct. The benefit of this approach is that Azure automatically rotates the identity."
30+
- content: "Azure Key Vault protects data when it's traveling between Azure Key Vault and clients. What protocol does it use for encryption?"
31+
choices:
32+
- content: "Secure Sockets Layer"
33+
isCorrect: false
34+
explanation: "Incorrect. The Secure Sockets Layer protocol has been replaced with the Transport Layer Security protocol."
35+
- content: "Transport Layer Security"
36+
isCorrect: true
37+
explanation: "Correct. Azure Key Vault enforces Transport Layer Security protocol to protect data when it’s traveling between Azure Key Vault and clients."
38+
- content: "Presentation Layer"
39+
isCorrect: false
40+
explanation: "Incorrect. Presentation Layer is part of the Open Systems Interconnection model and is not a security protocol."
Lines changed: 17 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,17 @@
1-
### YamlMime:ModuleUnit
2-
uid: learn.wwl.implement-azure-key-vault.summary
3-
title: Summary
4-
metadata:
5-
title: Summary
6-
description: "Summary"
7-
ms.date: 03/12/2024
8-
author: wwlpublish
9-
ms.author: jeffko
10-
ms.topic: unit
11-
ms.custom:
12-
- N/A
13-
durationInMinutes: 3
14-
content: |
15-
[!include[](includes/7-summary.md)]
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.implement-azure-key-vault.summary
3+
title: Summary
4+
metadata:
5+
adobe-target: true
6+
prefetch-feature-rollout: true
7+
title: Summary
8+
description: "Summary"
9+
ms.date: 06/27/2025
10+
author: wwlpublish
11+
ms.author: jeffko
12+
ms.topic: unit
13+
ms.custom:
14+
- N/A
15+
durationInMinutes: 3
16+
content: |
17+
[!include[](includes/7-summary.md)]

learn-pr/wwl-azure/implement-azure-key-vault/includes/1-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,4 +4,4 @@ After completing this module, you'll be able to:
44

55
* Describe the benefits of using Azure Key Vault
66
* Explain how to authenticate to Azure Key Vault
7-
* Set and retrieve a secret from Azure Key Vault by using the Azure CLI
7+
* Create and retrieve secrets from Azure Key Vault

learn-pr/wwl-azure/implement-azure-key-vault/includes/2-key-vault-overview.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,9 +15,9 @@ Azure Key Vault has two service tiers: Standard, which encrypts with a software
1515

1616
* **Centralized application secrets:** Centralizing storage of application secrets in Azure Key Vault allows you to control their distribution. For example, instead of storing the connection string in the app's code you can store it securely in Key Vault. Your applications can securely access the information they need by using URIs. These URIs allow the applications to retrieve specific versions of a secret.
1717

18-
* **Securely store secrets and keys:** Access to a key vault requires proper authentication and authorization before a caller (user or application) can get access. Authentication is done via Microsoft Entra ID. Authorization may be done via Azure role-based access control (Azure RBAC) or Key Vault access policy. Azure RBAC can be used for both management of the vaults and to access data stored in a vault, while key vault access policy can only be used when attempting to access data stored in a vault. Azure Key Vaults may be either software-protected or, with the Azure Key Vault Premium tier, hardware-protected by hardware security modules (HSMs).
18+
* **Securely store secrets and keys:** Access to a key vault requires proper authentication and authorization before a caller (user or application) can get access. Authentication is done via Microsoft Entra ID. Authorization might be done via Azure role-based access control (Azure RBAC) or Key Vault access policy. Azure RBAC can be used for both management of the vaults, and to access data stored in a vault. A key vault access policy can only be used when attempting to access data stored in a vault. Azure Key Vaults might be either software-protected or, with the Azure Key Vault Premium tier, hardware-protected by hardware security modules (HSMs).
1919

20-
* **Monitor access and use:** You can monitor activity by enabling logging for your vaults. You have control over your logs and you may secure them by restricting access and you may also delete logs that you no longer need. Azure Key Vault can be configured to:
20+
* **Monitor access and use:** You can monitor activity by enabling logging for your vaults. You have control over your logs and you might secure them by restricting access and you might also delete logs that you no longer need. Azure Key Vault can be configured to:
2121

2222
* Archive to a storage account.
2323
* Stream to an event hub.
@@ -30,3 +30,4 @@ Azure Key Vault has two service tiers: Standard, which encrypts with a software
3030
* Replicating the contents of your Key Vault within a region and to a secondary region. Data replication ensures high availability and takes away the need of any action from the administrator to trigger the failover.
3131
* Providing standard Azure administration options via the portal, Azure CLI and PowerShell.
3232
* Automating certain tasks on certificates that you purchase from Public CAs, such as enrollment and renewal.
33+

learn-pr/wwl-azure/implement-azure-key-vault/includes/3-key-vault-concepts.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,3 +27,4 @@ Perfect Forward Secrecy (PFS) protects connections between customers’ client s
2727
* **Logging:** Be sure to turn on logging and alerts.
2828

2929
* **Recovery options:** Turn on [soft-delete](/azure/key-vault/general/soft-delete-overview) and purge protection if you want to guard against force deletion of the secret.
30+

0 commit comments

Comments
 (0)