Azure Key Vault Keys
Keys in Azure Key Vault (KV):
- are protected by KV Software or stored in HSM
Hardware Security Module - a physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing (BYOK
Bring Your Own Key are always stored in HSM
Hardware Security Module - a physical computing device that safeguards and manages digital keys for strong authentication and provides cryptoprocessing).
- are versioned objects.
- may include dash "-" character in a key name. Other special characters are forbidden.
KV Key Types
The following table summarizes supported KV key types and BYOKBring Your Own Key / non-BYOK
Bring Your Own Key key creation options.
Key type | Size/Curve | non-BYOK | BYOK |
---|---|---|---|
RSA | 2048, 3072, 4096 | √ | √ |
EC | P256, P384, P521, SECP256K1 | √ | √ |
Reference:
KV Crypto Operations and Algorithms
The following table summarizes UID-based crypto operations supported by Azure.
Key type | Decrypt/Encrypt | Sign/Verify | Wrap/Unwrap |
---|---|---|---|
RSA | √ | √ | √ |
ECC![]() |
√ | √ |
Note: When generating or importing the external keystore key via CORE, it is sufficient to specify Decrypt to enable both Decrypt and Encrypt. The same applies to Sign and to Unwrap. See Azure KV Key Operations.
- RSA (RSA algorithms) for Keys 2K, 3K, 4K
-
- Decrypt and Unwrap
- PKCS
Public-Key Cryptography Standards - Industry-standard cryptography specifications.-V1_5
- OAEP
Optimal Asymmetric Encryption Padding - A padding scheme often used together with RSA encryption of symmetric keys. with SHA1
- OAEP
Optimal Asymmetric Encryption Padding - A padding scheme often used together with RSA encryption of symmetric keys. with SHA256
-
- Sign
- PSS
probabilistic signature scheme. Abbreviation of RSASSA-PSS with SHA256, SHA384, and SHA512
- PKCS
Public-Key Cryptography Standards - Industry-standard cryptography specifications.-V1_5 SHA256, SHA384, and SHA512
- ECC
Elliptic-curve cryptography - an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields (EC algorithms)
-
- Sign
- P256 with sha256
- P384 with sha384
- P521 with sha512
- SECP256k1 with sha256
KV Key Management Operations
The following table compares CORE and KV key management options and references Key Vault documentation for further details.
Operation | CORE | KV | Comment / Differences | Reference |
---|---|---|---|---|
Generate | √ | √ |
|
|
Import | √ | √ |
|
|
Key policy | ≈ | ≈ |
|
|
Delete / Destroy | √ | √ |
|
|
Cancellation of Delete | √ |
|
||
Activate / Revoke |
√ | √ |
|
|
Enable | √ | √ | ||
Disable | √ | √ | ||
Rekey / Rotate | √ | ≈ |
|
|
Get Info | √ | √ |
|
|
Get Public | √ | √ |
|
|
Get Private | √ |
|
||
Backup / Restore | ≈ | √ |
|
Note: the ≈ sign indicates the availability of alternatives.