1. Home
  2. Training Library
  3. Microsoft Azure
  4. Courses
  5. Configuring and Managing Azure Key Vault

Configuring and Managing Azure Key Vault

Contents

keyboard_tab
Configuring and Managing Azure Key Vault
1
Introduction
PREVIEW1m 38s
2
Overview
PREVIEW3m 53s

The course is part of this learning path

Introduction
Difficulty
Intermediate
Duration
33m
Students
76
Ratings
5/5
starstarstarstarstar
Description

Configuring and Managing Azure Key Vault starts with a key vault overview before moving on to authenticating and accessing Azure Key Vault as a user and as an application. We then deploy several key vaults to illustrate various creation, authentication, and access scenarios. Next, we create secrets and access them using the .NET and REST API interfaces. We then look at vault business continuity and backup options before seeing how to implement key rotation.

Learning Objectives

  • Overview of Azure Key Vault
  • Create an Azure Key Vault
  • Create and consume secrets
  • Learn about keeping vault data safe
  • Learn about key rotation

Intended Audience

  • Students working towards the AZ-500: Microsoft Azure Security Technologies exam
  • Those wanting to learn about Azure Key Vault and how to use it from application and user perspectives

Prerequisites

  • Students should be familiar with Active Directory concepts such as managed identities and role-based access control
Transcript

Hi, and welcome to this Configuring and Managing Azure Key Vault course. My Name is Hallam Webber, and I'm an Azure instructor with 25-plus years of experience in the IT industry, and since 2014 I've focused on Microsoft Azure cloud technologies.

This course is intended for students who want to learn about Azure Key Vault, what it is, what it's used for, and, importantly, how to use it. Students preparing for the AZ-500: Microsoft Azure Security Technologies exam will find this course helpful.

We start with an overview of Azure Key Vault before creating a key vault through the portal and via PowerShell commands. Then we take an in-depth look at creating and accessing secrets before examining backup and restore options. Finally, we examine key rotation in the context of SQL transparent data encryption.

This is a beginner's course in terms of Azure Key Vault knowledge, but it does assume you know what role-based access control is and about Active Directory-managed identities. One lecture uses application code and a logic app, but this is for illustrative purposes and doesn't require you to have any coding experience.

When I created this course, all information was current. If you have any feedback, positive or negative, or if you notice anything that needs to be updated or corrected, please reach out to us at support@cloudacademy.com.

Without further ado, let's unlock our key vault knowledge.

About the Author
Students
25628
Courses
60
Learning Paths
10

Hallam is a software architect with over 20 years experience across a wide range of industries. He began his software career as a  Delphi/Interbase disciple but changed his allegiance to Microsoft with its deep and broad ecosystem. While Hallam has designed and crafted custom software utilizing web, mobile and desktop technologies, good quality reliable data is the key to a successful solution. The challenge of quickly turning data into useful information for digestion by humans and machines has led Hallam to specialize in database design and process automation. Showing customers how leverage new technology to change and improve their business processes is one of the key drivers keeping Hallam coming back to the keyboard.