Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

typo: data-plane/Microsoft.KeyVault #4700

Merged
merged 1 commit into from
Dec 3, 2018
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ ms.manager: mbaldwin

# Azure Key Vault

Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms, and enables the use of Hardware Security Modules (HSM) for high value customer keys. Key Vault also supports storage of secrets, limited size octet objects. Certificate management is also available through Key Vault including support for renewal processing and workign with a range of certificate authorities.
Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms, and enables the use of Hardware Security Modules (HSM) for high value customer keys. Key Vault also supports storage of secrets, limited size octet objects. Certificate management is also available through Key Vault including support for renewal processing and working with a range of certificate authorities.


## REST Operation Groups
Expand All @@ -20,7 +20,7 @@ Azure Key Vault enables users to store and use cryptographic keys within the Mic
|-----------------|-------------|
|Keys | Operations for interacting with keys including create, import, update, and delete.|
|Secrets | Operations for interacting with secrets including create, update, and delete.|
|Certificates | Operations for interacting with certificates including create, import, update, delete and a set of contact and renawal management tasks.|
|Certificates | Operations for interacting with certificates including create, import, update, delete and a set of contact and renewal management tasks.|
|Storage | Operations for interacting with storage accounts including create, read, update, delete, list, regeneratekey and a set of sas definition related tasks.|

## See Also
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -467,7 +467,7 @@
],
"operationId": "encrypt",
"summary": "Encrypts an arbitrary sequence of bytes using an encryption key that is stored in a key vault.",
"description": "The ENCRYPT operation encrypts an arbitrary sequence of bytes using an encryption key that is stored in Azure Key Vault. Note that the ENCRYPT operation only supports a single block of data, the size of which is dependent on the target key and the encryption algorithm to be used. The ENCRYPT operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. This operation requires the keys/encypt permission.",
"description": "The ENCRYPT operation encrypts an arbitrary sequence of bytes using an encryption key that is stored in Azure Key Vault. Note that the ENCRYPT operation only supports a single block of data, the size of which is dependent on the target key and the encryption algorithm to be used. The ENCRYPT operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. This operation requires the keys/encrypt permission.",
"parameters": [
{
"name": "key-name",
Expand Down Expand Up @@ -1019,7 +1019,7 @@
}
},
"x-ms-examples": {
"Setsecret": {
"SetSecret": {
"$ref": "./examples//SetSecret-example.json"
}
}
Expand Down Expand Up @@ -4472,7 +4472,7 @@
"type": "integer",
"format": "int32",
"minimum": 0,
"description": "The duration that the ceritifcate is valid in months."
"description": "The duration that the certificate is valid in months."
}
},
"description": "Properties of the X509 component of a certificate."
Expand Down Expand Up @@ -4657,7 +4657,7 @@
"email": {
"x-ms-client-name": "EmailAddress",
"type": "string",
"description": "Email addresss."
"description": "Email address."
},
"phone": {
"type": "string",
Expand Down Expand Up @@ -4689,7 +4689,7 @@
"email": {
"x-ms-client-name": "EmailAddress",
"type": "string",
"description": "Email addresss."
"description": "Email address."
},
"name": {
"type": "string",
Expand Down Expand Up @@ -5778,7 +5778,7 @@
"nextLink": {
"type": "string",
"readOnly": true,
"description": "The URL to get the next set of SAS defintions."
"description": "The URL to get the next set of SAS definitions."
}
},
"description": "The storage account SAS definition list result."
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2299,7 +2299,7 @@
"type": "integer",
"format": "int32",
"minimum": 0,
"description": "The duration that the ceritifcate is valid in months."
"description": "The duration that the certificate is valid in months."
}
},
"description": "Properties of the X509 component of a certificate."
Expand Down Expand Up @@ -2479,7 +2479,7 @@
"email": {
"x-ms-client-name": "EmailAddress",
"type": "string",
"description": "Email addresss."
"description": "Email address."
},
"phone": {
"type": "string",
Expand Down Expand Up @@ -2511,7 +2511,7 @@
"email": {
"x-ms-client-name": "EmailAddress",
"type": "string",
"description": "Email addresss."
"description": "Email address."
},
"name": {
"type": "string",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ ms.manager: mbaldwin

# Azure Key Vault

Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms, and enables the use of Hardware Security Modules (HSM) for high value customer keys. Key Vault also supports storage of secrets, limited size octet objects. Certificate management is also available through Key Vault including support for renewal processing and workign with a range of certificate authorities.
Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms, and enables the use of Hardware Security Modules (HSM) for high value customer keys. Key Vault also supports storage of secrets, limited size octet objects. Certificate management is also available through Key Vault including support for renewal processing and working with a range of certificate authorities.


## REST Operation Groups
Expand All @@ -20,7 +20,7 @@ Azure Key Vault enables users to store and use cryptographic keys within the Mic
|-----------------|-------------|
|Keys | Operations for interacting with keys including create, import, update, and delete.|
|Secrets | Operations for interacting with secrets including create, update, and delete.|
|Certificates | Operations for interacting with certificates including create, import, update, delete and a set of contact and renawal management tasks.|
|Certificates | Operations for interacting with certificates including create, import, update, delete and a set of contact and renewal management tasks.|
|Storage | Operations for interacting with storage accounts including create, read, update, delete, list, regeneratekey and a set of sas definition related tasks.|

## See Also
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -422,7 +422,7 @@
],
"operationId": "encrypt",
"summary": "Encrypts an arbitrary sequence of bytes using an encryption key that is stored in a key vault.",
"description": "The ENCRYPT operation encrypts an arbitrary sequence of bytes using an encryption key that is stored in Azure Key Vault. Note that the ENCRYPT operation only supports a single block of data, the size of which is dependent on the target key and the encryption algorithm to be used. The ENCRYPT operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. This operation requires the keys/encypt permission.",
"description": "The ENCRYPT operation encrypts an arbitrary sequence of bytes using an encryption key that is stored in Azure Key Vault. Note that the ENCRYPT operation only supports a single block of data, the size of which is dependent on the target key and the encryption algorithm to be used. The ENCRYPT operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. This operation requires the keys/encrypt permission.",
"parameters": [
{
"name": "key-name",
Expand Down Expand Up @@ -1363,7 +1363,7 @@
}
}
}
},
},
"/certificates": {
"get": {
"tags": [
Expand Down Expand Up @@ -3066,7 +3066,7 @@
},
{
"value": "Recoverable+Purgeable",
"description": "Soft-delete is enabled for this vault; A priveleged user may trigger an immediate, irreversible deletion(purge) of a deleted entity."
"description": "Soft-delete is enabled for this vault; A privileged user may trigger an immediate, irreversible deletion(purge) of a deleted entity."
},
{
"value": "Recoverable",
Expand Down Expand Up @@ -3654,7 +3654,7 @@
"type": "integer",
"format": "int32",
"minimum": 0,
"description": "The duration that the ceritifcate is valid in months."
"description": "The duration that the certificate is valid in months."
}
},
"description": "Properties of the X509 component of a certificate."
Expand Down Expand Up @@ -3834,7 +3834,7 @@
"email": {
"x-ms-client-name": "EmailAddress",
"type": "string",
"description": "Email addresss."
"description": "Email address."
},
"phone": {
"type": "string",
Expand Down Expand Up @@ -3866,7 +3866,7 @@
"email": {
"x-ms-client-name": "EmailAddress",
"type": "string",
"description": "Email addresss."
"description": "Email address."
},
"name": {
"type": "string",
Expand Down Expand Up @@ -4448,7 +4448,7 @@
}
},
"description": "The backup secret result, containing the backup blob."
},
},
"PendingCertificateSigningRequestResult": {
"properties": {
"value": {
Expand Down Expand Up @@ -4742,7 +4742,7 @@
"nextLink": {
"type": "string",
"readOnly": true,
"description": "The URL to get the next set of SAS defintions."
"description": "The URL to get the next set of SAS definitions."
}
},
"description": "The storage account SAS definition list result."
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ ms.manager: mbaldwin

# Azure Key Vault

Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms, and enables the use of Hardware Security Modules (HSM) for high value customer keys. Key Vault also supports storage of secrets, limited size octet objects. Certificate management is also available through Key Vault including support for renewal processing and workign with a range of certificate authorities.
Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms, and enables the use of Hardware Security Modules (HSM) for high value customer keys. Key Vault also supports storage of secrets, limited size octet objects. Certificate management is also available through Key Vault including support for renewal processing and working with a range of certificate authorities.


## REST Operation Groups
Expand All @@ -20,7 +20,7 @@ Azure Key Vault enables users to store and use cryptographic keys within the Mic
|-----------------|-------------|
|Keys | Operations for interacting with keys including create, import, update, and delete.|
|Secrets | Operations for interacting with secrets including create, update, and delete.|
|Certificates | Operations for interacting with certificates including create, import, update, delete and a set of contact and renawal management tasks.|
|Certificates | Operations for interacting with certificates including create, import, update, delete and a set of contact and renewal management tasks.|
|Storage | Operations for interacting with storage accounts including create, read, update, delete, list, regeneratekey and a set of sas definition related tasks.|

## See Also
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -467,7 +467,7 @@
],
"operationId": "encrypt",
"summary": "Encrypts an arbitrary sequence of bytes using an encryption key that is stored in a key vault.",
"description": "The ENCRYPT operation encrypts an arbitrary sequence of bytes using an encryption key that is stored in Azure Key Vault. Note that the ENCRYPT operation only supports a single block of data, the size of which is dependent on the target key and the encryption algorithm to be used. The ENCRYPT operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. This operation requires the keys/encypt permission.",
"description": "The ENCRYPT operation encrypts an arbitrary sequence of bytes using an encryption key that is stored in Azure Key Vault. Note that the ENCRYPT operation only supports a single block of data, the size of which is dependent on the target key and the encryption algorithm to be used. The ENCRYPT operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. This operation requires the keys/encrypt permission.",
"parameters": [
{
"name": "key-name",
Expand Down Expand Up @@ -1019,7 +1019,7 @@
}
},
"x-ms-examples": {
"Setsecret": {
"SetSecret": {
"$ref": "./examples//SetSecret-example.json"
}
}
Expand Down Expand Up @@ -4472,7 +4472,7 @@
"type": "integer",
"format": "int32",
"minimum": 0,
"description": "The duration that the ceritifcate is valid in months."
"description": "The duration that the certificate is valid in months."
}
},
"description": "Properties of the X509 component of a certificate."
Expand Down Expand Up @@ -4657,7 +4657,7 @@
"email": {
"x-ms-client-name": "EmailAddress",
"type": "string",
"description": "Email addresss."
"description": "Email address."
},
"phone": {
"type": "string",
Expand Down Expand Up @@ -4689,7 +4689,7 @@
"email": {
"x-ms-client-name": "EmailAddress",
"type": "string",
"description": "Email addresss."
"description": "Email address."
},
"name": {
"type": "string",
Expand Down Expand Up @@ -5778,7 +5778,7 @@
"nextLink": {
"type": "string",
"readOnly": true,
"description": "The URL to get the next set of SAS defintions."
"description": "The URL to get the next set of SAS definitions."
}
},
"description": "The storage account SAS definition list result."
Expand Down