Loading source
Pulling the file list, source metadata, and syntax-aware rendering for this listing.
Source from repo
Assess and enforce Azure compliance requirements including policies, regulatory standards, and security baselines
Files
Skill
Size
Entrypoint
Format
Open file
Syntax-highlighted preview of this file as included in the skill package.
references/sdk/azure-keyvault-keys-rust.md
1# Key Vault Keys — Rust SDK Quick Reference23> Condensed from **azure-keyvault-keys-rust**. Full patterns (EC keys,4> backup/restore, crypto operations, RBAC permissions)5> in the **azure-keyvault-keys-rust** plugin skill if installed.67## Install8cargo add azure_security_keyvault_keys azure_identity910## Quick Start11```rust12use azure_identity::DeveloperToolsCredential;13use azure_security_keyvault_keys::KeyClient;14let credential = DeveloperToolsCredential::new(None)?;15let client = KeyClient::new("https://<vault>.vault.azure.net/", credential.clone(), None)?;16```1718## Best Practices19- Use Entra ID auth — `DeveloperToolsCredential` for dev, `ManagedIdentityCredential` for production20- Use HSM keys for sensitive workloads — hardware-protected keys21- Use EC for signing — more efficient than RSA22- Use RSA for encryption — when encrypting data23- Backup keys for disaster recovery24- Enable soft delete — required for production vaults25- Use key rotation — create new versions periodically2627## Non-Obvious Patterns28```rust29use azure_security_keyvault_keys::models::{CreateKeyParameters, KeyType};30let params = CreateKeyParameters { kty: KeyType::Rsa, key_size: Some(2048), ..Default::default() };31client.create_key("name", params.try_into()?, None).await?.into_model()?;32```33