Skip to content
This repository was archived by the owner on Feb 15, 2024. It is now read-only.
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit b649e0d

Browse files
authoredNov 9, 2021
* Docs fixed product naming - KeyVault vs Key Vault
* Docs fixed product naming - KeyVault vs Key Vault
1 parent 3c65257 commit b649e0d

File tree

4 files changed

+7
-7
lines changed

4 files changed

+7
-7
lines changed
 

‎docs/content/en/deep-dives/cmk.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ For these cases, a [Managed HSM](https://docs.microsoft.com/en-us/azure/key-vaul
4040
This can support importing KEKs from an [onsite HSM](https://docs.microsoft.com/en-us/azure/key-vault/managed-hsm/hsm-protected-keys-byok) that ensures the import
4141
never leaves a HSM boundary, while allowing customers to have secure external backups of the key.
4242

43-
As Managed HSMs use a similar API to KeyVault, any changes needed to use a Managed HSM would be minimal.
43+
As Managed HSMs use a similar API to Key Vault, any changes needed to use a Managed HSM would be minimal.
4444

4545
For lower security requirements, software backed encryption keys can also be used for CMK, for reduced cost, and easier, but less secure backup.
4646

‎docs/content/en/deep-dives/key-vault.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -20,19 +20,19 @@ For more information on Azure Key Vault RBAC please refer to the [product docume
2020

2121
### Azure Spring PropertySource
2222

23-
Each of the upstream Spring based applications has been configured to use a Azure KeyVault Spring PropertySource. This allows the applications to load certain Spring properties from KeyVault, however it requires us to use a specific naming pattern for the KeyVault items. The table below shows which naming pattern is used for each key.
23+
Each of the upstream Spring based applications has been configured to use a Azure Key Vault Spring PropertySource. This allows the applications to load certain Spring properties from Key Vault, however it requires us to use a specific naming pattern for the KeyVault items. The table below shows which naming pattern is used for each key.
2424

2525
See the [Azure Key Vault Secrets Spring Boot starter client library for Java documentation](https://github.com/Azure/azure-sdk-for-java/tree/3f31d68eed6fbe11516ca3afe3955c8840a6e974/sdk/spring/azure-spring-boot-starter-keyvault-secrets) and [algorithm](https://github.com/Azure/azure-sdk-for-java/blob/3f31d68eed6fbe11516ca3afe3955c8840a6e974/sdk/spring/azure-spring-boot/src/main/java/com/azure/spring/keyvault/KeyVaultOperation.java#L165-L177) for more details.
2626

2727
### Azure Key Vault Provider for Secrets Store CSI Driver (AKS)
2828

2929
The Azure Key Vault provider for Secrets Store CSI driver allows us to get secret contents stored in an Azure Key Vault instance and use the Secrets Store CSI driver interface to mount them into Kubernetes Pods.
3030

31-
This reference architecture uses this CSI Driver to mount the various certificates into the approperiate Kubernetes Pod's filesystem. This method was chosen as it reduced the number of upstream code changes necessary, however, ideally this would be replaced with direct integration with KeyVault, discussed in the next section below.
31+
This reference architecture uses this CSI Driver to mount the various certificates into the approperiate Kubernetes Pod's filesystem. This method was chosen as it reduced the number of upstream code changes necessary, however, ideally this would be replaced with direct integration with Key Vault, discussed in the next section below.
3232

3333
For more information on this CSI driver please refer to the [upstream documentation](https://github.com/Azure/secrets-store-csi-driver-provider-azure).
3434

35-
### Future: Direct integration of KeyVault into the upstream applications
35+
### Future: Direct integration of Key Vault into the upstream applications
3636

3737
Ideally, each of the upstream applications would never require access to read the various certificate private keys from Key Vault and they would instead integrate directly with the Key Vault sigining APIs. This would significantly reduce the risk of accidentally exposing private keys in the event of a misconfigration, malware, breach or other security incident by storing the Private Keys in a non-exportable HSM backed key.
3838

‎docs/content/en/terraform/ie.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ description: >
107107
| <a name="input_tenant_id"></a> [tenant\_id](#input\_tenant\_id) | Tenant to deploy into | `string` | n/a | yes |
108108
| <a name="input_businessrule_service_version"></a> [businessrule\_service\_version](#input\_businessrule\_service\_version) | Version Number of the Business Rules Service | `string` | `"1.1.2-b0be8f4-azure-0.0.1-1293959"` | no |
109109
| <a name="input_enable_log_analytics_workspace"></a> [enable\_log\_analytics\_workspace](#input\_enable\_log\_analytics\_workspace) | Enable the creation of azurerm\_log\_analytics\_workspace and azurerm\_log\_analytics\_solution or not | `bool` | `false` | no |
110-
| <a name="input_generation"></a> [generation](#input\_generation) | Generation number to be appended to certain resource names (e.g. Purge Protected KeyVault's). Changing this value can only be done during a fresh deployment. | `number` | `1` | no |
110+
| <a name="input_generation"></a> [generation](#input\_generation) | Generation number to be appended to certain resource names (e.g. Purge Protected Key Vault's). Changing this value can only be done during a fresh deployment. | `number` | `1` | no |
111111
| <a name="input_issuance_service_version"></a> [issuance\_service\_version](#input\_issuance\_service\_version) | Version Number of the Issuance Service | `string` | `"1.0.5-7408b55-azure-0.0.1-1293959"` | no |
112112
| <a name="input_issuance_web_version"></a> [issuance\_web\_version](#input\_issuance\_web\_version) | Version Number of the Issuance Web | `string` | `"1.1.2-45daa28-azure-0.0.1-1293959"` | no |
113113
| <a name="input_log_analytics_cluster_id"></a> [log\_analytics\_cluster\_id](#input\_log\_analytics\_cluster\_id) | Enable the sending of Azure Log Workspace to Log Analytics Analytics Custer ID supplied | `string` | `null` | no |

‎docs/content/en/terraform/variables.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ enable_log_analytics_workspace = false
4545
# Version Number of the Gateway
4646
gateway_version = "1.1.3-44c8778-azure-0.0.1-5f09fbf"
4747

48-
# Generation number to be appended to certain resource names (e.g. Purge Protected KeyVault's). Changing this value can only be done during a fresh deployment.
48+
# Generation number to be appended to certain resource names (e.g. Purge Protected Key Vault's). Changing this value can only be done during a fresh deployment.
4949
generation = 1
5050

5151
# GitHub Container Registry Password
@@ -103,7 +103,7 @@ businessrule_service_version = "1.1.2-b0be8f4-azure-0.0.1-1293959"
103103
# Enable the creation of azurerm_log_analytics_workspace and azurerm_log_analytics_solution or not
104104
enable_log_analytics_workspace = false
105105

106-
# Generation number to be appended to certain resource names (e.g. Purge Protected KeyVault's). Changing this value can only be done during a fresh deployment.
106+
# Generation number to be appended to certain resource names (e.g. Purge Protected Key Vault's). Changing this value can only be done during a fresh deployment.
107107
generation = 1
108108

109109
# GitHub Container Registry Password

0 commit comments

Comments
 (0)
This repository has been archived.