Skip to content

Commit 3324f1f

Browse files
Merge pull request #2663 from msmbaldwin/placeholder-standardization-keys
Standardize placeholders in key-vault/keys
2 parents 9b998b9 + c7bda96 commit 3324f1f

11 files changed

Lines changed: 68 additions & 68 deletions

articles/key-vault/keys/about-keys.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: msmbaldwin
77
ms.service: azure-key-vault
88
ms.subservice: keys
99
ms.topic: overview
10-
ms.date: 05/30/2025
10+
ms.date: 03/26/2026
1111
ms.author: mbaldwin
1212
---
1313

@@ -17,8 +17,8 @@ Azure Key Vault provides two types of resources to store and manage cryptographi
1717

1818
|Resource type|Key protection methods|Data-plane endpoint base URL|
1919
|--|--|--|
20-
| **Vaults** | Software-protected and HSM-protected (HSM key types in Premium SKU) | https://{vault-name}.vault.azure.net |
21-
| **Managed HSMs** | HSM-protected | https://{hsm-name}.managedhsm.azure.net |
20+
| **Vaults** | Software-protected and HSM-protected (HSM key types in Premium SKU) | `https://<vault-name>.vault.azure.net` |
21+
| **Managed HSMs** | HSM-protected | `https://<hsm-name>.managedhsm.azure.net` |
2222
||||
2323

2424
- **Vaults** - Vaults provide a low-cost, easy to deploy, multi-tenant, zone-resilient (where available), highly available key management solution suitable for most common cloud application scenarios.

articles/key-vault/keys/byok-specification.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: msmbaldwin
77
ms.service: azure-key-vault
88
ms.subservice: keys
99
ms.topic: feature-guide
10-
ms.date: 01/30/2026
10+
ms.date: 03/26/2026
1111
ms.author: mbaldwin
1212
ms.custom: devx-track-azurecli
1313
---
@@ -66,7 +66,7 @@ The configuration of the source HSM is generally outside the scope of this speci
6666
Use the **az keyvault key create** command to create a KEK with key operations set to import. Note the key identifier `kid` returned from this command.
6767

6868
```azurecli
69-
az keyvault key create --kty RSA-HSM --size 4096 --name KEKforBYOK --ops import --vault-name ContosoKeyVaultHSM
69+
az keyvault key create --kty RSA-HSM --size 4096 --name KEKforBYOK --ops import --vault-name <vault-name>
7070
```
7171

7272
> [!NOTE]
@@ -77,7 +77,7 @@ az keyvault key create --kty RSA-HSM --size 4096 --name KEKforBYOK --ops import
7777
Download the public key portion of the KEK and store it in a PEM file.
7878

7979
```azurecli
80-
az keyvault key download --name KEKforBYOK --vault-name ContosoKeyVaultHSM --file KEKforBYOK.publickey.pem
80+
az keyvault key download --name KEKforBYOK --vault-name <vault-name> --file KEKforBYOK.publickey.pem
8181
```
8282

8383
### Generate key transfer blob by using HSM vendor provided BYOK tool
@@ -106,17 +106,17 @@ If you use CKM_RSA_AES_KEY_WRAP_PAD, the JSON serialization of the transfer blob
106106
"schema_version": "1.0.0",
107107
"header":
108108
{
109-
"kid": "<key identifier of the KEK>",
109+
"kid": "<kek-key-id>",
110110
"alg": "dir",
111111
"enc": "CKM_RSA_AES_KEY_WRAP"
112112
},
113-
"ciphertext":"BASE64URL(<ciphertext contents>)",
113+
"ciphertext":"BASE64URL(<ciphertext>)",
114114
"generator": "BYOK tool name and version; source HSM name and firmware version"
115115
}
116116

117117
```
118118

119-
* `kid` = key identifier of KEK. For Key Vault keys, it looks like this: `https://ContosoKeyVaultHSM.vault.azure.net/keys/mykek/eba63d27e4e34e028839b53fac905621`
119+
* `kid` = key identifier of KEK. For Key Vault keys, it looks like this: `https://<vault-name>.vault.azure.net/keys/mykek/<key-version>`
120120
* `alg` = algorithm.
121121
* `dir` = Direct mode. The referenced `kid` directly protects the ciphertext, which is an accurate representation of CKM_RSA_AES_KEY_WRAP.
122122
* `generator` = an informational field that denotes the name and version of BYOK tool and the source HSM manufacturer and model. Use this information for troubleshooting and support.
@@ -129,18 +129,18 @@ To import a key, transfer the Key Transfer Blob (".byok" file) to an online work
129129

130130
To import an RSA key, use the following command:
131131
```azurecli
132-
az keyvault key import --vault-name ContosoKeyVaultHSM --name ContosoFirstHSMkey --byok-file KeyTransferPackage-ContosoFirstHSMkey.byok --ops encrypt decrypt
132+
az keyvault key import --vault-name <vault-name> --name <key-name> --byok-file KeyTransferPackage-<key-name>.byok --ops encrypt decrypt
133133
```
134134
To import an EC key, specify the key type and the curve name.
135135

136136
```azurecli
137-
az keyvault key import --vault-name ContosoKeyVaultHSM --name ContosoFirstHSMkey --kty EC-HSM --curve-name "P-256" --byok-file KeyTransferPackage-ContosoFirstHSMkey.byok --ops sign verify
137+
az keyvault key import --vault-name <vault-name> --name <key-name> --kty EC-HSM --curve-name "P-256" --byok-file KeyTransferPackage-<key-name>.byok --ops sign verify
138138
```
139139

140140
When you run this command, it sends a REST API request as follows:
141141

142142
```
143-
PUT https://contosokeyvaulthsm.vault.azure.net/keys/ContosoFirstHSMKey?api-version=7.0
143+
PUT https://<vault-name>.vault.azure.net/keys/<key-name>?api-version=7.0
144144
```
145145

146146
Request body when importing an RSA key:
@@ -152,7 +152,7 @@ Request body when importing an RSA key:
152152
"decrypt",
153153
"encrypt"
154154
],
155-
"key_hsm": "<Base64 encoded BYOK_BLOB>"
155+
"key_hsm": "<base64-encoded-byok-blob>"
156156
},
157157
"attributes": {
158158
"enabled": true
@@ -170,15 +170,15 @@ Request body when importing an EC key:
170170
"sign",
171171
"verify"
172172
],
173-
"key_hsm": "<Base64 encoded BYOK_BLOB>"
173+
"key_hsm": "<base64-encoded-byok-blob>"
174174
},
175175
"attributes": {
176176
"enabled": true
177177
}
178178
}
179179
```
180180

181-
The `key_hsm` value is the entire contents of the KeyTransferPackage-ContosoFirstHSMkey.byok file, encoded in Base64 format.
181+
The `key_hsm` value is the entire contents of the KeyTransferPackage-`<key-name>`.byok file, encoded in Base64 format.
182182

183183
## References
184184
- [Key Vault Developer's Guide](../general/developers-guide.md)

articles/key-vault/keys/hsm-protected-keys-byok.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -106,25 +106,25 @@ Use the [az keyvault key create](/cli/azure/keyvault/key#az-keyvault-key-create)
106106
### [Azure CLI](#tab/azure-cli)
107107

108108
```azurecli
109-
az keyvault key create --kty RSA-HSM --size 4096 --name KEKforBYOK --ops import --vault-name ContosoKeyVaultHSM
109+
az keyvault key create --kty RSA-HSM --size 4096 --name KEKforBYOK --ops import --vault-name <vault-name>
110110
```
111111

112112
For Managed HSM:
113113

114114
```azurecli
115-
az keyvault key create --kty RSA-HSM --size 4096 --name KEKforBYOK --ops import --hsm-name ContosoKeyVaultHSM
115+
az keyvault key create --kty RSA-HSM --size 4096 --name KEKforBYOK --ops import --hsm-name <hsm-name>
116116
```
117117

118118
### [Azure PowerShell](#tab/azure-powershell)
119119

120120
```azurepowershell
121-
Add-AzKeyVaultKey -VaultName 'ContosoKeyVaultHSM' -Name 'KEKforBYOK' -Destination 'HSM' -Size 4096 -KeyOps 'import'
121+
Add-AzKeyVaultKey -VaultName "<vault-name>" -Name "KEKforBYOK" -Destination "HSM" -Size 4096 -KeyOps "import"
122122
```
123123

124124
For Managed HSM:
125125

126126
```azurepowershell
127-
Add-AzKeyVaultKey -HsmName 'ContosoKeyVaultHSM' -Name 'KEKforBYOK' -Destination 'HSM' -Size 4096 -KeyOps 'import'
127+
Add-AzKeyVaultKey -HsmName "<hsm-name>" -Name "KEKforBYOK" -Destination "HSM" -Size 4096 -KeyOps "import"
128128
```
129129

130130
---
@@ -136,25 +136,25 @@ Use [az keyvault key download](/cli/azure/keyvault/key#az-keyvault-key-download)
136136
### [Azure CLI](#tab/azure-cli)
137137

138138
```azurecli
139-
az keyvault key download --name KEKforBYOK --vault-name ContosoKeyVaultHSM --file KEKforBYOK.publickey.pem
139+
az keyvault key download --name KEKforBYOK --vault-name <vault-name> --file KEKforBYOK.publickey.pem
140140
```
141141

142142
For Managed HSM:
143143

144144
```azurecli
145-
az keyvault key download --name KEKforBYOK --hsm-name ContosoKeyVaultHSM --file KEKforBYOK.publickey.pem
145+
az keyvault key download --name KEKforBYOK --hsm-name <hsm-name> --file KEKforBYOK.publickey.pem
146146
```
147147

148148
### [Azure PowerShell](#tab/azure-powershell)
149149

150150
```azurepowershell
151-
Get-AzKeyVaultKey -VaultName 'ContosoKeyVaultHSM' -KeyName 'KEKforBYOK' -OutFile 'KEKforBYOK.publickey.pem'
151+
Get-AzKeyVaultKey -VaultName "<vault-name>" -KeyName "KEKforBYOK" -OutFile "KEKforBYOK.publickey.pem"
152152
```
153153

154154
For Managed HSM:
155155

156156
```azurepowershell
157-
Get-AzKeyVaultKey -HsmName 'ContosoKeyVaultHSM' -KeyName 'KEKforBYOK' -OutFile 'KEKforBYOK.publickey.pem'
157+
Get-AzKeyVaultKey -HsmName "<hsm-name>" -KeyName "KEKforBYOK" -OutFile "KEKforBYOK.publickey.pem"
158158
```
159159

160160
---
@@ -183,24 +183,24 @@ To import an RSA key, use the following command. The `--kty` parameter is option
183183
### [Azure CLI](#tab/azure-cli)
184184

185185
```azurecli
186-
az keyvault key import --vault-name ContosoKeyVaultHSM --name ContosoFirstHSMkey --byok-file KeyTransferPackage-ContosoFirstHSMkey.byok
186+
az keyvault key import --vault-name <vault-name> --name <key-name> --byok-file KeyTransferPackage-<key-name>.byok
187187
```
188188

189189
For Managed HSM:
190190

191191
```azurecli
192-
az keyvault key import --hsm-name ContosoKeyVaultHSM --name ContosoFirstHSMkey --byok-file KeyTransferPackage-ContosoFirstHSMkey.byok
192+
az keyvault key import --hsm-name <hsm-name> --name <key-name> --byok-file KeyTransferPackage-<key-name>.byok
193193
```
194194

195195
### [Azure PowerShell](#tab/azure-powershell)
196196

197197
```azurepowershell
198-
Add-AzKeyVaultKey -VaultName 'ContosoKeyVaultHSM' -KeyName 'ContosoFirstHSMkey' -KeyFilePath 'KeyTransferPackage-ContosoFirstHSMkey.byok'
198+
Add-AzKeyVaultKey -VaultName "<vault-name>" -KeyName "<key-name>" -KeyFilePath "KeyTransferPackage-<key-name>.byok"
199199
```
200200
For Managed HSM:
201201

202202
```azurepowershell
203-
Add-AzKeyVaultKey -HsmName 'ContosoKeyVaultHSM' -KeyName 'ContosoFirstHSMkey' -KeyFilePath 'KeyTransferPackage-ContosoFirstHSMkey.byok'
203+
Add-AzKeyVaultKey -HsmName "<hsm-name>" -KeyName "<key-name>" -KeyFilePath "KeyTransferPackage-<key-name>.byok"
204204
```
205205

206206
---
@@ -210,25 +210,25 @@ To import an EC key, you must specify the key type and the curve name.
210210
### [Azure CLI](#tab/azure-cli)
211211

212212
```azurecli
213-
az keyvault key import --vault-name ContosoKeyVaultHSM --name ContosoFirstHSMkey --kty EC-HSM --curve-name "P-256" --byok-file KeyTransferPackage-ContosoFirstHSMkey.byok
213+
az keyvault key import --vault-name <vault-name> --name <key-name> --kty EC-HSM --curve-name "P-256" --byok-file KeyTransferPackage-<key-name>.byok
214214
```
215215

216216
For Managed HSM:
217217

218218
```azurecli
219-
az keyvault key import --hsm-name ContosoKeyVaultHSM --name ContosoFirstHSMkey --kty EC-HSM --curve-name "P-256" --byok-file KeyTransferPackage-ContosoFirstHSMkey.byok
219+
az keyvault key import --hsm-name <hsm-name> --name <key-name> --kty EC-HSM --curve-name "P-256" --byok-file KeyTransferPackage-<key-name>.byok
220220
```
221221

222222
### [Azure PowerShell](#tab/azure-powershell)
223223

224224
```azurepowershell
225-
Add-AzKeyVaultKey -VaultName 'ContosoKeyVaultHSM' -KeyName 'ContosoFirstHSMkey' -KeyType EC -CurveName P-256 -KeyFilePath 'KeyTransferPackage-ContosoFirstHSMkey.byok'
225+
Add-AzKeyVaultKey -VaultName "<vault-name>" -KeyName "<key-name>" -KeyType EC -CurveName P-256 -KeyFilePath "KeyTransferPackage-<key-name>.byok"
226226
```
227227

228228
For Managed HSM:
229229

230230
```azurepowershell
231-
Add-AzKeyVaultKey -HsmName 'ContosoKeyVaultHSM' -KeyName 'ContosoFirstHSMkey' -KeyType EC -CurveName P-256 -KeyFilePath 'KeyTransferPackage-ContosoFirstHSMkey.byok'
231+
Add-AzKeyVaultKey -HsmName "<hsm-name>" -KeyName "<key-name>" -KeyType EC -CurveName P-256 -KeyFilePath "KeyTransferPackage-<key-name>.byok"
232232
```
233233

234234
---

articles/key-vault/keys/hsm-protected-keys-ncipher.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -582,7 +582,7 @@ When you run this command, replace *contosokey* with the same value you specifie
582582

583583
You are asked to plug in your security world admin cards.
584584

585-
When the command completes, you see **Result: SUCCESS** and the copy of your key with reduced permissions are in the file named key_xferacId_\<contosokey>.
585+
When the command completes, you see **Result: SUCCESS** and the copy of your key with reduced permissions are in the file named key_xferacId_`<contosokey>`.
586586

587587
You may inspects the ACLS using following commands using the nCipher nShield utilities:
588588

articles/key-vault/keys/quick-create-bicep.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: azure-key-vault
88
ms.subservice: keys
99
ms.topic: quickstart
1010
ms.author: mbaldwin
11-
ms.date: 11/19/2025
11+
ms.date: 03/26/2026
1212
#Customer intent: As a security admin who is new to Azure, I want to use Key Vault to securely store keys and passwords in Azure.
1313
---
1414

@@ -140,13 +140,13 @@ More Azure Key Vault template samples can be found in [Azure Quickstart Template
140140
141141
```azurepowershell
142142
New-AzResourceGroup -Name exampleRG -Location eastus
143-
New-AzResourceGroupDeployment -ResourceGroupName exampleRG -TemplateFile ./main.bicep -vaultName "<key-vault-name>" -keyName "<key-name>"
143+
New-AzResourceGroupDeployment -ResourceGroupName exampleRG -TemplateFile ./main.bicep -vaultName "<vault-name>" -keyName "<key-name>"
144144
```
145145
146146
---
147147
148148
> [!NOTE]
149-
> Replace **\<vault-name\>** with the name of the key vault. Replace **\<vault-name\>** with the name of the key vault, and replace **\<key-name\>** with the name of the key.
149+
> Replace **`<vault-name>`** with the name of the key vault. Replace **`<vault-name>`** with the name of the key vault, and replace **`<key-name>`** with the name of the key.
150150
151151
When the deployment finishes, you should see a message indicating the deployment succeeded.
152152

articles/key-vault/keys/quick-create-cli.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: msmbaldwin
55
ms.service: azure-key-vault
66
ms.subservice: keys
77
ms.topic: quickstart
8-
ms.date: 01/30/2026
8+
ms.date: 03/26/2026
99
ms.author: mbaldwin
1010
ms.custom: devx-track-azurecli, mode-api
1111
#Customer intent: As a security admin who is new to Azure, I want to use Key Vault to securely store keys and passwords in Azure
@@ -39,16 +39,16 @@ To add a key to the vault, you just need to take a couple of additional steps. T
3939
Type this command to create a key called **ExampleKey** :
4040

4141
```azurecli
42-
az keyvault key create --vault-name "<your-unique-keyvault-name>" -n ExampleKey --protection software
42+
az keyvault key create --vault-name "<vault-name>" -n ExampleKey --protection software
4343
```
4444

45-
You can now reference this key that you added to Azure Key Vault by using its URI. Use **`https://<your-unique-keyvault-name>.vault.azure.net/keys/ExampleKey`** to get the current version.
45+
You can now reference this key that you added to Azure Key Vault by using its URI. Use **`https://<vault-name>.vault.azure.net/keys/ExampleKey`** to get the current version.
4646

4747
To view previously stored key:
4848

4949
```azurecli
5050
51-
az keyvault key show --name "ExampleKey" --vault-name "<your-unique-keyvault-name>"
51+
az keyvault key show --name "ExampleKey" --vault-name "<vault-name>"
5252
```
5353

5454
Now, you've created a Key Vault, stored a key, and retrieved it.

articles/key-vault/keys/quick-create-java.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Provides a quickstart for the Azure Key Vault Keys client library f
44
author: msmbaldwin
55
ms.custom: devx-track-java, devx-track-azurecli, devx-track-azurepowershell, mode-api, passwordless-java, devx-track-extended-java
66
ms.author: mbaldwin
7-
ms.date: 01/30/2026
7+
ms.date: 03/26/2026
88

99
ms.service: azure-key-vault
1010
ms.subservice: keys
@@ -125,19 +125,19 @@ This application is using your key vault name as an environment variable called
125125
Windows
126126

127127
```cmd
128-
set KEY_VAULT_NAME=<your-key-vault-name>
128+
set KEY_VAULT_NAME=<vault-name>
129129
````
130130
131131
Windows PowerShell
132132
133133
```powershell
134-
$Env:KEY_VAULT_NAME="<your-key-vault-name>"
134+
$Env:KEY_VAULT_NAME="<vault-name>"
135135
```
136136

137137
macOS or Linux
138138

139139
```cmd
140-
export KEY_VAULT_NAME=<your-key-vault-name>
140+
export KEY_VAULT_NAME=<vault-name>
141141
```
142142

143143
## Object model
@@ -169,7 +169,7 @@ Application requests to most Azure services must be authorized. Using the [Defau
169169

170170
In this quickstart, `DefaultAzureCredential` authenticates to key vault using the credentials of the local development user logged into the Azure CLI. When the application is deployed to Azure, the same `DefaultAzureCredential` code can automatically discover and use a managed identity that is assigned to an App Service, Virtual Machine, or other services. For more information, see [Managed Identity Overview](/entra/identity/managed-identities-azure-resources/overview).
171171

172-
In this example, the name of your key vault is expanded to the key vault URI, in the format `https://<your-key-vault-name>.vault.azure.net`. For more information about authenticating to key vault, see [Developer's Guide](/azure/key-vault/general/developers-guide#authenticate-to-key-vault-in-code).
172+
In this example, the name of your key vault is expanded to the key vault URI, in the format `https://<vault-name>.vault.azure.net`. For more information about authenticating to key vault, see [Developer's Guide](/azure/key-vault/general/developers-guide#authenticate-to-key-vault-in-code).
173173

174174
```java
175175
String keyVaultName = System.getenv("KEY_VAULT_NAME");
@@ -192,7 +192,7 @@ keyClient.createKey(keyName, KeyType.RSA);
192192
You can verify that the key has been set with the [az keyvault key show](/cli/azure/keyvault/key?#az-keyvault-key-show) command:
193193

194194
```azurecli
195-
az keyvault key show --vault-name <your-unique-key-vault-name> --name myKey
195+
az keyvault key show --vault-name <vault-name> --name myKey
196196
```
197197

198198
### Retrieve a key
@@ -219,19 +219,19 @@ deletionPoller.waitForCompletion();
219219
You can verify that the key has been deleted with the [az keyvault key show](/cli/azure/keyvault/key?#az-keyvault-key-show) command:
220220

221221
```azurecli
222-
az keyvault key show --vault-name <your-unique-key-vault-name> --name myKey
222+
az keyvault key show --vault-name <vault-name> --name myKey
223223
```
224224

225225
## Clean up resources
226226

227227
When no longer needed, you can use the Azure CLI or Azure PowerShell to remove your key vault and the corresponding resource group.
228228

229229
```azurecli
230-
az group delete -g "myResourceGroup"
230+
az group delete -g "<resource-group>"
231231
```
232232

233233
```azurepowershell
234-
Remove-AzResourceGroup -Name "myResourceGroup"
234+
Remove-AzResourceGroup -Name "<resource-group>"
235235
```
236236

237237
## Sample code

0 commit comments

Comments
 (0)