Microsoft.Azure.KeyVaultv3.0.5
License: Permissive (MIT)
Published: over 4 years ago
Published: over 4 years ago
Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value customer keys. In addition, Azure Key Vault allows users to securely store secrets in a Key Vault; secrets are limited size octet objects and Azure Key Vault applies no specific semantics to these objects. A Key Vault may contain a mix of keys and secrets at the same time, and access control for the two types of object is independently controlled. Users, subject to appropriate authorization, may: 1) Manage cryptographic keys using Create, Import, Update, Delete and other operations 2) Manage secrets using Get, Set, Delete and other operations 3) Use cryptographic keys with Sign/Verify, WrapKey/UnwrapKey and Encrypt/Decrypt operations. Operations against Key Vaults are authenticated and authorized using Azure Active Directory. Key Vault now supports certificates, a complex type that makes use of existing key and secret infrastructure for certificate operations. KV certificates also support notification and auto-renewal as well as other management features.
This library has been replaced by the following new Azure SDKs. You can read about the new Azure SDKs at https://aka.ms/azsdkvalueprop.
The latest libraries to interact with the Azure KeyVault service are:
* https://www.nuget.org/packages/Azure.Security.KeyVault.Keys
* https://www.nuget.org/packages/Azure.Security.KeyVault.Secrets
* https://www.nuget.org/packages/Azure.Security.KeyVault.Certificates
It is recommended that you move to the new package.
Fail
Risk: Vulnerabilities
1 severe vulnerabilities exploited
SAFE Assessment
Compliance
Licenses
No license compliance issues
Secrets
No sensitive information found
Security
Vulnerabilities
1 severe vulnerabilities exploited
Hardening
No application hardening issues
Threats
Tampering
No evidence of software tampering
Malware
No evidence of malware inclusion
Issues
high
Detected presence of high severity vulnerabilities.
vulnerabilities
high
Detected presence of severe vulnerabilities with active exploitation.
vulnerabilities
medium
Detected presence of medium severity vulnerabilities.
vulnerabilities
low
Detected digital signatures that have not been performed with an extended validation certificate.
signatures
low
Detected digital signatures that rely on a weak digest algorithm for integrity validation.
signatures
Behaviors
Vulnerabilities
Downloads
161.14M
Total Downloads
Maintenance
2
Maintainers
Dependencies
19
Declared Dependencies
Dependents
0
Dependents
Issues per Version Graph
Scanned 2 days ago