2. Challenges with configurations
Team
Development
QA Testing
User
Acceptance
Testing
Production
◦ Changes when moving through
environments
◦ Configurations shared with multiple
people
◦ Mostly stored in plain text
◦ No way to monitor the usage
3. What is Azure Key Vault?
◦ Centralize Application Secrets
◦ Securing Storage of Keys and Secrets
◦ Monitor Access and Use
◦ Simplified Administration
◦ Simplified integration
◦ Secrets
Store secured access tokens, passwords and API Keys
◦ Keys
Encryption keys
◦ Certificates
SSL Certificates for Azure services
4. Terminology
◦ HSM - A hardware security module (HSM) is a physical computing device that safeguards and manages
digital keys for strong authentication and provides cryptoprocessing.
◦ EC Keys – Elliptic Curve Cryptography, Based on Algebraic Structure of elliptic curves over a finite field
◦ RSA Keys - Rivest–Shamir–Adleman Generates a public key based on 2 prime numbers. Prime numbers
kept secret. Public key shared for encryption.