当前位置:网站首页>Azure key vault (1) Introduction
Azure key vault (1) Introduction
2022-07-24 15:40:00 【Stone-hdj】
Azure Key Vault It is a safe management secret Secret( password , Token, etc ), secret key Key And certificates Certificate Service for .
Let's talk about why we use Key Vault, What are its advantages :
Centralized management ‘ confidential ’ data
Note: Microsoft's official documents are translated as confidential , But I think the word "secret" is more like a noun of degree . We can say that ‘ confidential ’ It can be understood as data similar to passwords , It's just Key Vault You can save more than just passwords , You can also save certificates , Token, etc .
Key Vault It can greatly reduce the possibility of accidental disclosure of secrets . With Key Vault, Developers no longer need to store security information in applications .
No need to store security information in applications , So there is no need to include this information as part of the code . for example , If Function App Need to connect to D365 Service for , The connection string can be safely stored in Key Vault in , Not stored in application code .
The program can use URI Information required for secure access . these URI Allows programs to retrieve a specific version of the secret . This eliminates the need to write custom code to protect data stored in Key Vault Any confidential information in .
Secure storage of secrets and keys
Access to the key vault requires authentication and authorization , Otherwise caller ( User or application ) cannot access . Authentication can be used to determine the identity of the caller , Authorization determines what the caller can do .
Authentication passed Azure AD To complete . Authorization can be obtained through Azure Role-based access control (Azure RBAC) or Key Vault Access policy to complete . Azure RBAC It can be used to manage the vault and access the data stored in the vault , The key vault access policy can only be used when trying to access the data stored in the vault .
Key Vault It can also be controlled by the hardware security module in the high-level layer (HSM) Provide hardware protection . Software protected key 、 Passwords and certificates are provided by Azure Use industry standard algorithm and key length for protection . If you need to improve reliability , Can be in HSM Never import or build beyond HSM The key of the boundary .
The last thing to point out is , according to Azure Key Vault The design of the ,Microsoft Unable to view or extract data ( This is what Microsoft said ).
Monitor usage
establish Key Vault in the future , We may need to monitor how and when users access keys and confidential data . At this point, you can monitor activity by enabling logging for the vault .
You can control your own log , You can also restrict access rights to ensure log security , You can also delete logs that you no longer need .
Simplify the management of secrets
- No need to know the internal knowledge of the hardware safety module .
- Copy within an area Key Vault The content of , And copy it to the secondary area . Data replication ensures high availability , No administrator action is required to trigger failover .
- Through the portal 、Azure CLI and PowerShell Provide standard Azure Management options to manage .
- For from public CA Purchased certificates automatically perform certain tasks , Such as registration and renewal .
in addition , You can also use Azure Key Vault To isolate application secrets .
Programs can only access the vaults they have access to , And can only perform specific operations . You can create one for each program Azure Key Vault, Only specific programs and teams of developers have access to the store Key Vault Secrets in .
And Azure Integration with other services of
- Azure encryption
- Azure App Service
- SQL The server and Azure SQL Encryption function in database
边栏推荐
- Yolo5face: why reinvent the face detector
- JUC source code learning note 3 - AQS waiting queue and cyclicbarrier, BlockingQueue
- 未来数据库需要关心的硬核创新
- 在LAMP架构中部署Zabbix监控系统及邮件报警机制
- 2022 robocom world robot developer competition - undergraduate group (provincial competition) rc-u4 strategy team (completed)
- 2022 robocom world robot developer competition - undergraduate group (provincial competition) -- question 2: intelligent medication assistant (finished)
- Lsyncd real time synchronization
- JMeter - call the interface for uploading files or pictures
- 【洛谷】P1908 逆序对
- Exomeiser annotates and prioritizes exome variants
猜你喜欢

Hard core innovation that database needs to care about in the future

Error: pidfile (celerybeat.pid) already exists when celery starts beat

2022 RoboCom 世界机器人开发者大赛-本科组(省赛)-- 第二题 智能服药助手 (已完结)

Mlx90640 infrared thermal imager temperature measurement module development notes (III)

【SWT】滚动容器实现商品列表样式

基于Lambert函数的时滞系统稳定性研究

MySQL学习笔记(总结)

Memorythrashing: Tiktok live broadcast to solve memory dithering practice

yolov6训练自己的数据集

Research on stability of time-delay systems based on Lambert function
随机推荐
Multus of kubernetes multi network card scheme_ CNI deployment and basic use
You are only one SQL statement away from the tdengine Developer Conference!
Varnish4.0缓存代理配置
降噪蓝牙耳机哪个好?性价比最高的降噪蓝牙耳机排行
celery 启动beat出现报错ERROR: Pidfile (celerybeat.pid) already exists.
Is Huishang futures platform safe? Is it OK to open a futures account?
Huawei wireless device configuration wpa2-802.1x-aes security policy
Still using listview? Use animatedlist to make list elements move
JUC source code learning note 3 - AQS waiting queue and cyclicbarrier, BlockingQueue
有了这个机器学习画图神器,论文、博客都可以事半功倍了!
Read the paper with me - multi model text recognition network
2022 robocom world robot developer competition - undergraduate group (provincial competition) rc-u4 strategy team (completed)
在LAMP架构中部署Zabbix监控系统及邮件报警机制
Mlx90640 infrared thermal imager temperature measurement module development notes (III)
Yolo5face: why reinvent the face detector
【SWT】自定义数据表格
Database learning – select (multi table joint query) [easy to understand]
How to deal with being attacked? Advanced anti DDoS IP protection strategy
Application modification log path log4j.properties
请问好的券商的排名?网上开户安全吗