Abstract
In the preceding chapters, we built a sophisticated encryption example with the ability to encrypt data with the efficiency of AES, and uses RSA to make it easier to swap encryption keys with other users. We then looked at how to leverage and set up Azure Key Vault, which offers a cost-effective way to use a hardware security module that traditionally is out of reach to most companies, except large organizations like banks.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsAuthor information
Authors and Affiliations
Rights and permissions
Copyright information
© 2019 Stephen Haunts
About this chapter
Cite this chapter
Haunts, S. (2019). Azure Key Vault Usage Patterns. In: Applied Cryptography in .NET and Azure Key Vault. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-4375-6_11
Download citation
DOI: https://doi.org/10.1007/978-1-4842-4375-6_11
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-4374-9
Online ISBN: 978-1-4842-4375-6
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)