You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Convert non-standard placeholders to lowercase kebab-case
- Fix curly-brace and camelCase placeholder formats
- Update ms.date for modified files
Part of placeholder standardization series.
#Customer intent: As a security admin who is new to Azure, I want to use Key Vault to securely store keys and passwords in Azure
@@ -31,12 +31,12 @@ secret
31
31
You can then pass this file to the Azure CLI [az keyvault secret set](/cli/azure/keyvault/secret#az-keyvault-secret-set) command using the `--file` parameter.
32
32
33
33
```azurecli-interactive
34
-
az keyvault secret set --vault-name "<your-unique-keyvault-name>" --name "MultilineSecret" --file "secretfile.txt"
34
+
az keyvault secret set --vault-name "<vault-name>" --name "MultilineSecret" --file "secretfile.txt"
35
35
```
36
36
You can then view the stored secret using the Azure CLI [az keyvault secret show](/cli/azure/keyvault/secret#az-keyvault-secret-show) command.
37
37
38
38
```azurecli-interactive
39
-
az keyvault secret show --name "MultilineSecret" --vault-name "<your-unique-keyvault-name>" --query "value"
39
+
az keyvault secret show --name "MultilineSecret" --vault-name "<vault-name>" --query "value"
40
40
```
41
41
42
42
The secret will be returned with `\n` in place of newline:
You can then view the stored secret using the Azure CLI [az keyvault secret show](/cli/azure/keyvault/secret#az-keyvault-secret-show) command or the Azure PowerShell [Get-AzKeyVaultSecret](/powershell/module/az.keyvault/get-azkeyvaultsecret) cmdlet.
66
66
67
67
```azurecli-interactive
68
-
az keyvault secret show --name "MultilineSecret" --vault-name "<your-unique-keyvault-name>" --query "value"
68
+
az keyvault secret show --name "MultilineSecret" --vault-name "<vault-name>" --query "value"
69
69
```
70
70
71
71
The secret will be returned with `\n` in place of newline:
Copy file name to clipboardExpand all lines: articles/key-vault/secrets/overview-storage-keys-powershell.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.service: azure-key-vault
6
6
ms.subservice: secrets
7
7
author: msmbaldwin
8
8
ms.author: mbaldwin
9
-
ms.date: 01/30/2026
9
+
ms.date: 03/26/2026
10
10
11
11
ms.custom: devx-track-azurepowershell
12
12
@@ -71,7 +71,7 @@ Connect-AzAccount
71
71
If you have multiple Azure subscriptions, you can list them using the [Get-AzSubscription](/powershell/module/az.accounts/get-azsubscription) cmdlet, and specify the subscription you wish to use with the [Set-AzContext](/powershell/module/az.accounts/set-azcontext) cmdlet.
72
72
73
73
```azurepowershell-interactive
74
-
Set-AzContext -SubscriptionId <subscriptionId>
74
+
Set-AzContext -SubscriptionId <subscription-id>
75
75
```
76
76
77
77
### Set variables
@@ -81,9 +81,9 @@ First, set the variables to be used by the PowerShell cmdlets in the following s
81
81
We'll also use the Azure PowerShell [Get-AzContext](/powershell/module/az.accounts/get-azcontext) and [Get-AzStorageAccount](/powershell/module/az.storage/get-azstorageaccount) cmdlets to get your user ID and the context of your Azure storage account.
The permissions for storage accounts aren't available on the storage account "Access policies" page in the Azure portal.
@@ -201,11 +201,11 @@ The commands in this section complete the following actions:
201
201
202
202
### Set variables
203
203
204
-
First, set the variables to be used by the PowerShell cmdlets in the following steps. Be sure to update the \<YourStorageAccountName\> and \<YourKeyVaultName\> placeholders.
204
+
First, set the variables to be used by the PowerShell cmdlets in the following steps. Be sure to update the `<storage-account-name>` and `<vault-name>` placeholders.
205
205
206
206
```azurepowershell-interactive
207
-
$storageAccountName = <YourStorageAccountName>
208
-
$keyVaultName = <YourKeyVaultName>
207
+
$storageAccountName = <storage-account-name>
208
+
$keyVaultName = <vault-name>
209
209
```
210
210
211
211
### Define a shared access signature definition template
@@ -237,7 +237,7 @@ For more information about account SAS, see:
237
237
Use the Azure PowerShell [Set-AzKeyVaultManagedStorageSasDefinition](/powershell/module/az.keyvault/set-azkeyvaultmanagedstoragesasdefinition) cmdlet to create a shared access signature definition. You can provide the name of your choice to the `-Name` parameter.
The secret corresponding to your SAS definition will have these properties:
254
254
255
255
```console
256
-
Vault Name : <YourKeyVaultName>
257
-
Name : <SecretName>
256
+
Vault Name : <vault-name>
257
+
Name : <secret-name>
258
258
...
259
259
Content Type : application/vnd.ms-sastoken-storage
260
260
Tags :
@@ -263,7 +263,7 @@ Tags :
263
263
You can now use the [Get-AzKeyVaultSecret](/powershell/module/az.keyvault/get-azkeyvaultsecret) cmdlet with the `VaultName` and `Name` parameters to view the contents of that secret.
Copy file name to clipboardExpand all lines: articles/key-vault/secrets/overview-storage-keys.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.service: azure-key-vault
7
7
ms.subservice: secrets
8
8
author: msmbaldwin
9
9
ms.author: mbaldwin
10
-
ms.date: 01/30/2026
10
+
ms.date: 03/26/2026
11
11
12
12
ms.custom: devx-track-azurecli
13
13
# Customer intent: As a developer, I want to use Azure Key Vault and Azure CLI for secure management of my storage credentials and shared access signature tokens.
@@ -75,10 +75,10 @@ Use the Azure CLI [az role assignment create](/cli/azure/role/assignment) comman
75
75
76
76
-`--role`: Pass the "Storage Account Key Operator Service Role" Azure role. This role limits the access scope to your storage account. For a classic storage account, pass "Classic Storage Account Key Operator Service Role" instead.
77
77
-`--assignee`: Pass the value "https://vault.azure.net", which is the url for Key Vault in the Azure public cloud. (For Azure Government cloud use '--assignee-object-id' instead, see [Service principal application ID](#service-principal-application-id).)
78
-
-`--scope`: Pass your storage account resource ID, which is in the form `/subscriptions/<subscriptionID>/resourceGroups/<StorageAccountResourceGroupName>/providers/Microsoft.Storage/storageAccounts/<YourStorageAccountName>`. Find your subscription ID, by using the Azure CLI [az account list](/cli/azure/account?#az-account-list) command. Find your storage account name and storage account resource group, by using the Azure CLI [az storage account list](/cli/azure/storage/account?#az-storage-account-list) command.
78
+
-`--scope`: Pass your storage account resource ID, which is in the form `/subscriptions/<subscription-id>/resourceGroups/<resource-group>/providers/Microsoft.Storage/storageAccounts/<storage-account-name>`. Find your subscription ID, by using the Azure CLI [az account list](/cli/azure/account?#az-account-list) command. Find your storage account name and storage account resource group, by using the Azure CLI [az storage account list](/cli/azure/storage/account?#az-storage-account-list) command.
79
79
80
80
```azurecli-interactive
81
-
az role assignment create --role "Storage Account Key Operator Service Role" --assignee "https://vault.azure.net" --scope "/subscriptions/<subscriptionID>/resourceGroups/<StorageAccountResourceGroupName>/providers/Microsoft.Storage/storageAccounts/<YourStorageAccountName>"
81
+
az role assignment create --role "Storage Account Key Operator Service Role" --assignee "https://vault.azure.net" --scope "/subscriptions/<subscription-id>/resourceGroups/<resource-group>/providers/Microsoft.Storage/storageAccounts/<storage-account-name>"
82
82
```
83
83
### Give your user account permission to managed storage accounts
84
84
@@ -87,7 +87,7 @@ Use the Azure CLI [az role assignment create](/cli/azure/role/assignment#az-role
87
87
```azurecli-interactive
88
88
# Give your user principal access to all storage account permissions, on your Key Vault instance
89
89
90
-
az role assignment create --role "Key Vault Secrets Officer" --assignee [email protected] --scope /subscriptions/{subscriptionID}/resourceGroups/{resource-group}/providers/Microsoft.KeyVault/vaults/<YourKeyVaultName>
90
+
az role assignment create --role "Key Vault Secrets Officer" --assignee [email protected] --scope /subscriptions/<subscription-id>/resourceGroups/<resource-group>/providers/Microsoft.KeyVault/vaults/<vault-name>
91
91
```
92
92
93
93
Permissions for storage accounts aren't available on the storage account "Access policies" page in the Azure portal.
@@ -98,10 +98,10 @@ Create a Key Vault managed storage account using the Azure CLI [az keyvault stor
98
98
99
99
-`--vault-name`: Pass the name of your key vault. To find the name of your key vault, use the Azure CLI [az keyvault list](/cli/azure/keyvault?#az-keyvault-list) command.
100
100
-`-n`: Pass the name of your storage account. To find the name of your storage account, use the Azure CLI [az storage account list](/cli/azure/storage/account?#az-storage-account-list) command.
101
-
-`--resource-id`: Pass your storage account resource ID, which is in the form `/subscriptions/<subscriptionID>/resourceGroups/<StorageAccountResourceGroupName>/providers/Microsoft.Storage/storageAccounts/<YourStorageAccountName>`. Find your subscription ID, by using the Azure CLI [az account list](/cli/azure/account?#az-account-list) command. Find your storage account name and storage account resource group, by using the Azure CLI [az storage account list](/cli/azure/storage/account?#az-storage-account-list) command.
101
+
-`--resource-id`: Pass your storage account resource ID, which is in the form `/subscriptions/<subscription-id>/resourceGroups/<resource-group>/providers/Microsoft.Storage/storageAccounts/<storage-account-name>`. Find your subscription ID, by using the Azure CLI [az account list](/cli/azure/account?#az-account-list) command. Find your storage account name and storage account resource group, by using the Azure CLI [az storage account list](/cli/azure/storage/account?#az-storage-account-list) command.
@@ -110,7 +110,7 @@ You can also ask Key Vault to generate shared access signature tokens. A shared
110
110
111
111
The commands in this section complete the following actions:
112
112
113
-
- Set an account shared access signature definition `<YourSASDefinitionName>`. The definition is set on a Key Vault managed storage account `<YourStorageAccountName>` in your key vault `<YourKeyVaultName>`.
113
+
- Set an account shared access signature definition `<sas-definition-name>`. The definition is set on a Key Vault managed storage account `<storage-account-name>` in your key vault `<vault-name>`.
114
114
- Set a Key Vault managed storage shared access signature definition in the vault. The definition has the template URI of the shared access signature token that was created. The definition has the shared access signature type `account` and is valid for N days.
115
115
- Verify that the shared access signature was saved in your key vault as a secret.
116
116
@@ -146,7 +146,7 @@ For more information about account SAS, see:
146
146
Use the Azure CLI [az keyvault storage sas-definition create](/powershell/module/az.keyvault/set-azkeyvaultmanagedstoragesasdefinition) command, passing the SAS definition template from the previous step to the `--template-uri` parameter, to create a shared access signature definition. You can provide the name of your choice to the `-n` parameter.
@@ -156,7 +156,7 @@ You can verify that the shared access signature definition has been stored in yo
156
156
You can now use the [az keyvault storage sas-definition show](/azure/key-vault/secrets/overview-storage-keys) command and the `id` property to view the content of that secret.
157
157
158
158
```azurecli-interactive
159
-
az keyvault storage sas-definition show --id https://<YourKeyVaultName>.vault.azure.net/storage/<YourStorageAccountName>/sas/<YourSASDefinitionName>
159
+
az keyvault storage sas-definition show --id https://<vault-name>.vault.azure.net/storage/<storage-account-name>/sas/<sas-definition-name>
Copy file name to clipboardExpand all lines: articles/key-vault/secrets/quick-create-bicep.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -79,7 +79,7 @@ Two Azure resources are defined in the Bicep file:
79
79
---
80
80
81
81
> [!NOTE]
82
-
> Replace **\<vault-name\>** with the name of the key vault. Replace **\<object-id\>** with the object ID of a user, service principal, or security group in the Microsoft Entra tenant for the vault. The object ID must be unique for the list of access policies. Get it by using Get-AzADUser or Get-AzADServicePrincipal cmdlets.
82
+
> Replace **`<vault-name>`** with the name of the key vault. Replace **`<object-id>`** with the object ID of a user, service principal, or security group in the Microsoft Entra tenant for the vault. The object ID must be unique for the list of access policies. Get it by using Get-AzADUser or Get-AzADServicePrincipal cmdlets.
83
83
84
84
When the deployment finishes, you should see a message indicating the deployment succeeded.
Copy file name to clipboardExpand all lines: articles/key-vault/secrets/quick-create-cli.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.service: azure-key-vault
6
6
ms.subservice: secrets
7
7
ms.topic: quickstart
8
8
ms.custom: mvc, devx-track-azurecli, mode-api
9
-
ms.date: 01/30/2026
9
+
ms.date: 03/26/2026
10
10
11
11
ms.author: mbaldwin
12
12
#Customer intent: As a security admin who is new to Azure, I want to use Key Vault to securely store keys and passwords in Azure
@@ -40,17 +40,17 @@ To add a secret to the vault, you just need to take a couple of additional steps
40
40
Use the Azure CLI [az keyvault secret set](/cli/azure/keyvault/secret#az-keyvault-secret-set) command below to create a secret in Key Vault called **ExamplePassword** that will store the value **hVFkk965BuUv** :
41
41
42
42
```azurecli
43
-
az keyvault secret set --vault-name "<your-unique-keyvault-name>" --name "ExamplePassword" --value "hVFkk965BuUv"
43
+
az keyvault secret set --vault-name "<vault-name>" --name "ExamplePassword" --value "hVFkk965BuUv"
44
44
```
45
45
46
46
## Retrieve a secret from Key Vault
47
47
48
-
You can now reference this password that you added to Azure Key Vault by using its URI. Use **`https://<your-unique-keyvault-name>.vault.azure.net/secrets/ExamplePassword`** to get the current version.
48
+
You can now reference this password that you added to Azure Key Vault by using its URI. Use **`https://<vault-name>.vault.azure.net/secrets/ExamplePassword`** to get the current version.
49
49
50
50
To view the value contained in the secret as plain text, use the Azure CLI [az keyvault secret show](/cli/azure/keyvault/secret#az-keyvault-secret-show) command:
51
51
52
52
```azurecli
53
-
az keyvault secret show --name "ExamplePassword" --vault-name "<your-unique-keyvault-name>" --query "value"
53
+
az keyvault secret show --name "ExamplePassword" --vault-name "<vault-name>" --query "value"
54
54
```
55
55
56
56
Now, you have created a Key Vault, stored a secret, and retrieved it.
0 commit comments