Skip to main content

Azure Key Vault Usage Patterns

  • Chapter
  • First Online:
Applied Cryptography in .NET and Azure Key Vault
  • 1968 Accesses

Abstract

In the preceding chapters, we built a sophisticated encryption example with the ability to encrypt data with the efficiency of AES, and uses RSA to make it easier to swap encryption keys with other users. We then looked at how to leverage and set up Azure Key Vault, which offers a cost-effective way to use a hardware security module that traditionally is out of reach to most companies, except large organizations like banks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Stephen Haunts

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Haunts, S. (2019). Azure Key Vault Usage Patterns. In: Applied Cryptography in .NET and Azure Key Vault. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-4375-6_11

Download citation

Publish with us

Policies and ethics