You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-**Vaults** - Vaults provide a low-cost, easy to deploy, multi-tenant, zone-resilient (where available), highly available key management solution suitable for most common cloud application scenarios.
Copy file name to clipboardExpand all lines: articles/key-vault/keys/byok-specification.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ author: msmbaldwin
7
7
ms.service: azure-key-vault
8
8
ms.subservice: keys
9
9
ms.topic: feature-guide
10
-
ms.date: 01/30/2026
10
+
ms.date: 03/26/2026
11
11
ms.author: mbaldwin
12
12
ms.custom: devx-track-azurecli
13
13
---
@@ -66,7 +66,7 @@ The configuration of the source HSM is generally outside the scope of this speci
66
66
Use the **az keyvault key create** command to create a KEK with key operations set to import. Note the key identifier `kid` returned from this command.
Download the public key portion of the KEK and store it in a PEM file.
78
78
79
79
```azurecli
80
-
az keyvault key download --name KEKforBYOK --vault-name ContosoKeyVaultHSM --file KEKforBYOK.publickey.pem
80
+
az keyvault key download --name KEKforBYOK --vault-name <vault-name> --file KEKforBYOK.publickey.pem
81
81
```
82
82
83
83
### Generate key transfer blob by using HSM vendor provided BYOK tool
@@ -106,17 +106,17 @@ If you use CKM_RSA_AES_KEY_WRAP_PAD, the JSON serialization of the transfer blob
106
106
"schema_version": "1.0.0",
107
107
"header":
108
108
{
109
-
"kid": "<key identifier of the KEK>",
109
+
"kid": "<kek-key-id>",
110
110
"alg": "dir",
111
111
"enc": "CKM_RSA_AES_KEY_WRAP"
112
112
},
113
-
"ciphertext":"BASE64URL(<ciphertext contents>)",
113
+
"ciphertext":"BASE64URL(<ciphertext>)",
114
114
"generator": "BYOK tool name and version; source HSM name and firmware version"
115
115
}
116
116
117
117
```
118
118
119
-
*`kid` = key identifier of KEK. For Key Vault keys, it looks like this: `https://ContosoKeyVaultHSM.vault.azure.net/keys/mykek/eba63d27e4e34e028839b53fac905621`
119
+
*`kid` = key identifier of KEK. For Key Vault keys, it looks like this: `https://<vault-name>.vault.azure.net/keys/mykek/<key-version>`
120
120
*`alg` = algorithm.
121
121
*`dir` = Direct mode. The referenced `kid` directly protects the ciphertext, which is an accurate representation of CKM_RSA_AES_KEY_WRAP.
122
122
*`generator` = an informational field that denotes the name and version of BYOK tool and the source HSM manufacturer and model. Use this information for troubleshooting and support.
@@ -129,18 +129,18 @@ To import a key, transfer the Key Transfer Blob (".byok" file) to an online work
Copy file name to clipboardExpand all lines: articles/key-vault/keys/hsm-protected-keys-ncipher.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -582,7 +582,7 @@ When you run this command, replace *contosokey* with the same value you specifie
582
582
583
583
You are asked to plug in your security world admin cards.
584
584
585
-
When the command completes, you see **Result: SUCCESS** and the copy of your key with reduced permissions are in the file named key_xferacId_\<contosokey>.
585
+
When the command completes, you see **Result: SUCCESS** and the copy of your key with reduced permissions are in the file named key_xferacId_`<contosokey>`.
586
586
587
587
You may inspects the ACLS using following commands using the nCipher nShield utilities:
> Replace **\<vault-name\>** with the name of the key vault. Replace **\<vault-name\>** with the name of the key vault, and replace **\<key-name\>** with the name of the key.
149
+
> Replace **`<vault-name>`** with the name of the key vault. Replace **`<vault-name>`** with the name of the key vault, and replace **`<key-name>`** with the name of the key.
150
150
151
151
When the deployment finishes, you should see a message indicating the deployment succeeded.
Copy file name to clipboardExpand all lines: articles/key-vault/keys/quick-create-cli.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: msmbaldwin
5
5
ms.service: azure-key-vault
6
6
ms.subservice: keys
7
7
ms.topic: quickstart
8
-
ms.date: 01/30/2026
8
+
ms.date: 03/26/2026
9
9
ms.author: mbaldwin
10
10
ms.custom: devx-track-azurecli, mode-api
11
11
#Customer intent: As a security admin who is new to Azure, I want to use Key Vault to securely store keys and passwords in Azure
@@ -39,16 +39,16 @@ To add a key to the vault, you just need to take a couple of additional steps. T
39
39
Type this command to create a key called **ExampleKey** :
40
40
41
41
```azurecli
42
-
az keyvault key create --vault-name "<your-unique-keyvault-name>" -n ExampleKey --protection software
42
+
az keyvault key create --vault-name "<vault-name>" -n ExampleKey --protection software
43
43
```
44
44
45
-
You can now reference this key that you added to Azure Key Vault by using its URI. Use **`https://<your-unique-keyvault-name>.vault.azure.net/keys/ExampleKey`** to get the current version.
45
+
You can now reference this key that you added to Azure Key Vault by using its URI. Use **`https://<vault-name>.vault.azure.net/keys/ExampleKey`** to get the current version.
46
46
47
47
To view previously stored key:
48
48
49
49
```azurecli
50
50
51
-
az keyvault key show --name "ExampleKey" --vault-name "<your-unique-keyvault-name>"
51
+
az keyvault key show --name "ExampleKey" --vault-name "<vault-name>"
52
52
```
53
53
54
54
Now, you've created a Key Vault, stored a key, and retrieved it.
@@ -125,19 +125,19 @@ This application is using your key vault name as an environment variable called
125
125
Windows
126
126
127
127
```cmd
128
-
set KEY_VAULT_NAME=<your-key-vault-name>
128
+
set KEY_VAULT_NAME=<vault-name>
129
129
````
130
130
131
131
Windows PowerShell
132
132
133
133
```powershell
134
-
$Env:KEY_VAULT_NAME="<your-key-vault-name>"
134
+
$Env:KEY_VAULT_NAME="<vault-name>"
135
135
```
136
136
137
137
macOS or Linux
138
138
139
139
```cmd
140
-
export KEY_VAULT_NAME=<your-key-vault-name>
140
+
export KEY_VAULT_NAME=<vault-name>
141
141
```
142
142
143
143
## Object model
@@ -169,7 +169,7 @@ Application requests to most Azure services must be authorized. Using the [Defau
169
169
170
170
In this quickstart, `DefaultAzureCredential` authenticates to key vault using the credentials of the local development user logged into the Azure CLI. When the application is deployed to Azure, the same `DefaultAzureCredential` code can automatically discover and use a managed identity that is assigned to an App Service, Virtual Machine, or other services. For more information, see [Managed Identity Overview](/entra/identity/managed-identities-azure-resources/overview).
171
171
172
-
In this example, the name of your key vault is expanded to the key vault URI, in the format `https://<your-key-vault-name>.vault.azure.net`. For more information about authenticating to key vault, see [Developer's Guide](/azure/key-vault/general/developers-guide#authenticate-to-key-vault-in-code).
172
+
In this example, the name of your key vault is expanded to the key vault URI, in the format `https://<vault-name>.vault.azure.net`. For more information about authenticating to key vault, see [Developer's Guide](/azure/key-vault/general/developers-guide#authenticate-to-key-vault-in-code).
0 commit comments