Abstract
In the preceding chapters, we built a sophisticated encryption example with the ability to encrypt data with the efficiency of AES, and uses RSA to make it easier to swap encryption keys with other users. We then looked at how to leverage and set up Azure Key Vault, which offers a cost-effective way to use a hardware security module that traditionally is out of reach to most companies, except large organizations like banks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Stephen Haunts
About this chapter
Cite this chapter
Haunts, S. (2019). Azure Key Vault Usage Patterns. In: Applied Cryptography in .NET and Azure Key Vault. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-4375-6_11
Download citation
DOI: https://doi.org/10.1007/978-1-4842-4375-6_11
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-4374-9
Online ISBN: 978-1-4842-4375-6
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)