Skip to content

Commit b7db152

Browse files
authored
[Key Vault] Authentication documentation updates (Azure#25602)
1 parent 5e83a2b commit b7db152

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

45 files changed

+477
-751
lines changed

sdk/keyvault/azure-keyvault-administration/README.md

Lines changed: 82 additions & 119 deletions
Large diffs are not rendered by default.

sdk/keyvault/azure-keyvault-administration/samples/access_control_operations.py

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,9 +20,8 @@
2020
#
2121
# 3. Set environment variable MANAGED_HSM_URL with the URL of your managed HSM
2222
#
23-
# 4. Set up your environment to use azure-identity's DefaultAzureCredential. To authenticate a service principal with
24-
# environment variables, set AZURE_CLIENT_ID, AZURE_CLIENT_SECRET, and AZURE_TENANT_ID
25-
# (See https://github.com/Azure/azure-sdk-for-python/tree/main/sdk/keyvault/azure-keyvault-administration#authenticate-the-client)
23+
# 4. Set up your environment to use azure-identity's DefaultAzureCredential. For more information about how to configure
24+
# the DefaultAzureCredential, refer to https://aka.ms/azsdk/python/identity/docs#azure.identity.DefaultAzureCredential
2625
#
2726
# ----------------------------------------------------------------------------------------------------------
2827
# Sample - demonstrates role definition and assignment operations for Managed HSM

sdk/keyvault/azure-keyvault-administration/samples/access_control_operations_async.py

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,9 +17,8 @@
1717
#
1818
# 3. Set environment variable MANAGED_HSM_URL with the URL of your managed HSM
1919
#
20-
# 4. Set up your environment to use azure-identity's DefaultAzureCredential. To authenticate a service principal with
21-
# environment variables, set AZURE_CLIENT_ID, AZURE_CLIENT_SECRET, and AZURE_TENANT_ID
22-
# (See https://github.com/Azure/azure-sdk-for-python/tree/main/sdk/keyvault/azure-keyvault-administration#authenticate-the-client)
20+
# 4. Set up your environment to use azure-identity's DefaultAzureCredential. For more information about how to configure
21+
# the DefaultAzureCredential, refer to https://aka.ms/azsdk/python/identity/docs#azure.identity.DefaultAzureCredential
2322
#
2423
# ----------------------------------------------------------------------------------------------------------
2524
# Sample - demonstrates role definition and assignment operations for Managed HSM

sdk/keyvault/azure-keyvault-administration/samples/backup_restore_operations.py

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,9 +15,8 @@
1515
#
1616
# 3. Set environment variable MANAGED_HSM_URL with the URL of your managed HSM
1717
#
18-
# 4. Set up your environment to use azure-identity's DefaultAzureCredential. To authenticate a service principal with
19-
# environment variables, set AZURE_CLIENT_ID, AZURE_CLIENT_SECRET, and AZURE_TENANT_ID
20-
# (See https://github.com/Azure/azure-sdk-for-python/tree/main/sdk/keyvault/azure-keyvault-administration#authenticate-the-client)
18+
# 4. Set up your environment to use azure-identity's DefaultAzureCredential. For more information about how to configure
19+
# the DefaultAzureCredential, refer to https://aka.ms/azsdk/python/identity/docs#azure.identity.DefaultAzureCredential
2120
#
2221
# 5. A storage account containing a blob storage container
2322
# (See https://docs.microsoft.com/azure/storage/blobs/storage-blobs-introduction)

sdk/keyvault/azure-keyvault-administration/samples/backup_restore_operations_async.py

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,9 +16,8 @@
1616
#
1717
# 3. Set environment variable MANAGED_HSM_URL with the URL of your managed HSM
1818
#
19-
# 4. Set up your environment to use azure-identity's DefaultAzureCredential. To authenticate a service principal with
20-
# environment variables, set AZURE_CLIENT_ID, AZURE_CLIENT_SECRET, and AZURE_TENANT_ID
21-
# (See https://github.com/Azure/azure-sdk-for-python/tree/main/sdk/keyvault/azure-keyvault-administration#authenticate-the-client)
19+
# 4. Set up your environment to use azure-identity's DefaultAzureCredential. For more information about how to configure
20+
# the DefaultAzureCredential, refer to https://aka.ms/azsdk/python/identity/docs#azure.identity.DefaultAzureCredential
2221
#
2322
# 5. A storage account containing a blob storage container
2423
# (See https://docs.microsoft.com/azure/storage/blobs/storage-blobs-introduction)

sdk/keyvault/azure-keyvault-certificates/README.md

Lines changed: 74 additions & 138 deletions
Large diffs are not rendered by default.

sdk/keyvault/azure-keyvault-certificates/samples/README.md

Lines changed: 30 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -10,18 +10,36 @@ urlFragment: keyvault-certificates-samples
1010

1111
# Azure Key Vault Certificates Client Library Python Samples
1212

13-
These code snippets highlight this SDK's common use cases.
14-
15-
* [hello_world.py][hello_world_sample] and [hello_world_async.py][hello_world_async_sample] - create/get/update/delete certificates
16-
* [backup_restore_operations.py][backup_operations_sample] and [backup_restore_operations_async.py][backup_operations_async_sample] - backup and
17-
recover certificates
18-
* [import_certificate.py][import_certificate_sample] and [import_certificate_async.py][import_certificate_async_sample] - import PKCS#12 (PFX)
19-
and PEM-formatted certificates into Key Vault
20-
* [list_operations.py][list_operations_sample] and [list_operations_async.py][list_operations_async_sample] - list certificates
21-
* [recover_purge_operations.py][recover_purge_operations_sample] and [recover_purge_operations_async.py][recover_purge_operations_async_sample] - recover and purge certificates
22-
* [issuers.py][issuers_sample] and [issuers_async.py][issuers_async_sample] - manage certificate issuers
23-
* [contacts.py][contacts_sample] and [contacts_async.py][contacts_async_sample] - manage certificate contacts
24-
* [parse_certificate.py][parse_sample] and [parse_certificate_async.py][parse_async_sample] - extract a certificate's private key
13+
## Prerequisites
14+
15+
You must have an [Azure subscription](https://azure.microsoft.com/free) and an
16+
[Azure Key Vault](https://docs.microsoft.com/azure/key-vault/general/overview) to run
17+
these samples. You can create a key vault with the
18+
[Azure CLI](https://docs.microsoft.com/azure/key-vault/general/quick-create-cli).
19+
20+
## Setup
21+
22+
To run these samples, first install the Key Vault Certificates and Azure Identity libraries:
23+
24+
```commandline
25+
pip install azure-keyvault-certificates azure-identity
26+
```
27+
28+
[Azure Identity](https://github.com/Azure/azure-sdk-for-python/blob/main/sdk/identity/azure-identity/README.md) is used for authenticating Key Vault clients. These samples use the
29+
[DefaultAzureCredential](https://github.com/Azure/azure-sdk-for-python/blob/main/sdk/identity/azure-identity/README.md#defaultazurecredential), but any credential from the library can be used with Key Vault clients.
30+
31+
## Contents
32+
33+
| File | Description |
34+
|-------------|-------------|
35+
| [hello_world.py][hello_world_sample] ([async version][hello_world_async_sample]) | create/get/update/delete certificates |
36+
| [backup_restore_operations.py][backup_operations_sample] ([async version][backup_operations_async_sample]) | back up and recover certificates |
37+
| [import_certificate.py][import_certificate_sample] ([async version][import_certificate_async_sample]) | import PKCS#12 (PFX) and PEM-formatted certificates into Key Vault |
38+
| [list_operations.py][list_operations_sample] ([async version][list_operations_async_sample]) | list certificates |
39+
| [recover_purge_operations.py][recover_purge_operations_sample] ([async version][recover_purge_operations_async_sample]) | recover and purge certificates |
40+
| [issuers.py][issuers_sample] ([async version][issuers_async_sample]) | manage certificate issuers |
41+
| [contacts.py][contacts_sample] ([async version][contacts_async_sample]) | manage certificate contacts |
42+
| [parse_certificate.py][parse_sample] ([async version][parse_async_sample]) | extract a certificate's private key |
2543

2644
[backup_operations_sample]: https://github.com/Azure/azure-sdk-for-python/tree/main/sdk/keyvault/azure-keyvault-certificates/samples/backup_restore_operations.py
2745
[backup_operations_async_sample]: https://github.com/Azure/azure-sdk-for-python/tree/main/sdk/keyvault/azure-keyvault-certificates/samples/backup_restore_operations_async.py

sdk/keyvault/azure-keyvault-certificates/samples/backup_restore_operations.py

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,16 +6,15 @@
66
import time
77
from azure.keyvault.certificates import CertificateClient, CertificatePolicy
88
from azure.identity import DefaultAzureCredential
9-
from azure.core.exceptions import HttpResponseError
109

1110
# ----------------------------------------------------------------------------------------------------------
1211
# Prerequisites:
13-
# 1. An Azure Key Vault (https://docs.microsoft.com/en-us/azure/key-vault/quick-create-cli)
12+
# 1. An Azure Key Vault (https://docs.microsoft.com/azure/key-vault/quick-create-cli)
1413
#
1514
# 2. azure-keyvault-certificates and azure-identity packages (pip install these)
1615
#
17-
# 3. Set Environment variables AZURE_CLIENT_ID, AZURE_TENANT_ID, AZURE_CLIENT_SECRET, VAULT_URL
18-
# (See https://github.com/Azure/azure-sdk-for-python/tree/main/sdk/keyvault/azure-keyvault-keys#authenticate-the-client)
16+
# 3. Set up your environment to use azure-identity's DefaultAzureCredential. For more information about how to configure
17+
# the DefaultAzureCredential, refer to https://aka.ms/azsdk/python/identity/docs#azure.identity.DefaultAzureCredential
1918
#
2019
# ----------------------------------------------------------------------------------------------------------
2120
# Sample - demonstrates the basic backup and restore operations on a vault(certificates) resource for Azure Key Vault
@@ -32,9 +31,7 @@
3231
# ----------------------------------------------------------------------------------------------------------
3332

3433
# Instantiate a certificate client that will be used to call the service.
35-
# Notice that the client is using default Azure credentials.
36-
# To make default credentials work, ensure that environment variables 'AZURE_CLIENT_ID',
37-
# 'AZURE_CLIENT_SECRET' and 'AZURE_TENANT_ID' are set with the service principal credentials.
34+
# Here we use the DefaultAzureCredential, but any azure-identity credential can be used.
3835
VAULT_URL = os.environ["VAULT_URL"]
3936
credential = DefaultAzureCredential()
4037
client = CertificateClient(vault_url=VAULT_URL, credential=credential)

sdk/keyvault/azure-keyvault-certificates/samples/backup_restore_operations_async.py

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,16 +7,15 @@
77
from azure.keyvault.certificates.aio import CertificateClient
88
from azure.keyvault.certificates import CertificatePolicy
99
from azure.identity.aio import DefaultAzureCredential
10-
from azure.core.exceptions import HttpResponseError
1110

1211
# ----------------------------------------------------------------------------------------------------------
1312
# Prerequisites:
14-
# 1. An Azure Key Vault (https://docs.microsoft.com/en-us/azure/key-vault/quick-create-cli)
13+
# 1. An Azure Key Vault (https://docs.microsoft.com/azure/key-vault/quick-create-cli)
1514
#
1615
# 2. azure-keyvault-certificates and azure-identity packages (pip install these)
1716
#
18-
# 3. Set Environment variables AZURE_CLIENT_ID, AZURE_TENANT_ID, AZURE_CLIENT_SECRET, VAULT_URL
19-
# (See https://github.com/Azure/azure-sdk-for-python/tree/main/sdk/keyvault/azure-keyvault-keys#authenticate-the-client)
17+
# 3. Set up your environment to use azure-identity's DefaultAzureCredential. For more information about how to configure
18+
# the DefaultAzureCredential, refer to https://aka.ms/azsdk/python/identity/docs#azure.identity.DefaultAzureCredential
2019
#
2120
# ----------------------------------------------------------------------------------------------------------
2221
# Sample - demonstrates the basic backup and restore operations on a vault(certificates) resource for Azure Key Vault
@@ -35,9 +34,7 @@
3534

3635
async def run_sample():
3736
# Instantiate a certificate client that will be used to call the service.
38-
# Notice that the client is using default Azure credentials.
39-
# To make default credentials work, ensure that environment variables 'AZURE_CLIENT_ID',
40-
# 'AZURE_CLIENT_SECRET' and 'AZURE_TENANT_ID' are set with the service principal credentials.
37+
# Here we use the DefaultAzureCredential, but any azure-identity credential can be used.
4138
vault_url = os.environ["VAULT_URL"]
4239
credential = DefaultAzureCredential()
4340
client = CertificateClient(vault_url=vault_url, credential=credential)

sdk/keyvault/azure-keyvault-certificates/samples/contacts.py

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,16 +5,15 @@
55
import os
66
from azure.identity import DefaultAzureCredential
77
from azure.keyvault.certificates import CertificateClient, CertificateContact
8-
from azure.core.exceptions import HttpResponseError
98

109
# ----------------------------------------------------------------------------------------------------------
1110
# Prerequisites:
12-
# 1. An Azure Key Vault (https://docs.microsoft.com/en-us/azure/key-vault/quick-create-cli)
11+
# 1. An Azure Key Vault (https://docs.microsoft.com/azure/key-vault/quick-create-cli)
1312
#
1413
# 2. azure-keyvault-certificates and azure-identity packages (pip install these)
1514
#
16-
# 3. Set Environment variables AZURE_CLIENT_ID, AZURE_TENANT_ID, AZURE_CLIENT_SECRET, VAULT_URL
17-
# (See https://github.com/Azure/azure-sdk-for-python/tree/main/sdk/keyvault/azure-keyvault-keys#authenticate-the-client)
15+
# 3. Set up your environment to use azure-identity's DefaultAzureCredential. For more information about how to configure
16+
# the DefaultAzureCredential, refer to https://aka.ms/azsdk/python/identity/docs#azure.identity.DefaultAzureCredential
1817
#
1918
# ----------------------------------------------------------------------------------------------------------
2019
# Sample - demonstrates basic CRUD operations for the certificate contacts for a key vault.
@@ -27,9 +26,7 @@
2726
# ----------------------------------------------------------------------------------------------------------
2827

2928
# Instantiate a certificate client that will be used to call the service.
30-
# Notice that the client is using default Azure credentials.
31-
# To make default credentials work, ensure that environment variables 'AZURE_CLIENT_ID',
32-
# 'AZURE_CLIENT_SECRET' and 'AZURE_TENANT_ID' are set with the service principal credentials.
29+
# Here we use the DefaultAzureCredential, but any azure-identity credential can be used.
3330
VAULT_URL = os.environ["VAULT_URL"]
3431
credential = DefaultAzureCredential()
3532
client = CertificateClient(vault_url=VAULT_URL, credential=credential)

0 commit comments

Comments
 (0)