diff --git a/specification/keyvault/data-plane/Microsoft.KeyVault/preview/7.0/index.md b/specification/keyvault/data-plane/Microsoft.KeyVault/preview/7.0/index.md index d65bfa10917e..ec4122cc584f 100644 --- a/specification/keyvault/data-plane/Microsoft.KeyVault/preview/7.0/index.md +++ b/specification/keyvault/data-plane/Microsoft.KeyVault/preview/7.0/index.md @@ -11,7 +11,7 @@ ms.manager: mbaldwin # Azure Key Vault -Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms, and enables the use of Hardware Security Modules (HSM) for high value customer keys. Key Vault also supports storage of secrets, limited size octet objects. Certificate management is also available through Key Vault including support for renewal processing and workign with a range of certificate authorities. +Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms, and enables the use of Hardware Security Modules (HSM) for high value customer keys. Key Vault also supports storage of secrets, limited size octet objects. Certificate management is also available through Key Vault including support for renewal processing and working with a range of certificate authorities. ## REST Operation Groups @@ -20,7 +20,7 @@ Azure Key Vault enables users to store and use cryptographic keys within the Mic |-----------------|-------------| |Keys | Operations for interacting with keys including create, import, update, and delete.| |Secrets | Operations for interacting with secrets including create, update, and delete.| -|Certificates | Operations for interacting with certificates including create, import, update, delete and a set of contact and renawal management tasks.| +|Certificates | Operations for interacting with certificates including create, import, update, delete and a set of contact and renewal management tasks.| |Storage | Operations for interacting with storage accounts including create, read, update, delete, list, regeneratekey and a set of sas definition related tasks.| ## See Also diff --git a/specification/keyvault/data-plane/Microsoft.KeyVault/preview/7.0/keyvault.json b/specification/keyvault/data-plane/Microsoft.KeyVault/preview/7.0/keyvault.json index f50706a58982..4ec608b0acf6 100644 --- a/specification/keyvault/data-plane/Microsoft.KeyVault/preview/7.0/keyvault.json +++ b/specification/keyvault/data-plane/Microsoft.KeyVault/preview/7.0/keyvault.json @@ -467,7 +467,7 @@ ], "operationId": "encrypt", "summary": "Encrypts an arbitrary sequence of bytes using an encryption key that is stored in a key vault.", - "description": "The ENCRYPT operation encrypts an arbitrary sequence of bytes using an encryption key that is stored in Azure Key Vault. Note that the ENCRYPT operation only supports a single block of data, the size of which is dependent on the target key and the encryption algorithm to be used. The ENCRYPT operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. This operation requires the keys/encypt permission.", + "description": "The ENCRYPT operation encrypts an arbitrary sequence of bytes using an encryption key that is stored in Azure Key Vault. Note that the ENCRYPT operation only supports a single block of data, the size of which is dependent on the target key and the encryption algorithm to be used. The ENCRYPT operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. This operation requires the keys/encrypt permission.", "parameters": [ { "name": "key-name", @@ -1019,7 +1019,7 @@ } }, "x-ms-examples": { - "Setsecret": { + "SetSecret": { "$ref": "./examples//SetSecret-example.json" } } @@ -4472,7 +4472,7 @@ "type": "integer", "format": "int32", "minimum": 0, - "description": "The duration that the ceritifcate is valid in months." + "description": "The duration that the certificate is valid in months." } }, "description": "Properties of the X509 component of a certificate." @@ -4657,7 +4657,7 @@ "email": { "x-ms-client-name": "EmailAddress", "type": "string", - "description": "Email addresss." + "description": "Email address." }, "phone": { "type": "string", @@ -4689,7 +4689,7 @@ "email": { "x-ms-client-name": "EmailAddress", "type": "string", - "description": "Email addresss." + "description": "Email address." }, "name": { "type": "string", @@ -5778,7 +5778,7 @@ "nextLink": { "type": "string", "readOnly": true, - "description": "The URL to get the next set of SAS defintions." + "description": "The URL to get the next set of SAS definitions." } }, "description": "The storage account SAS definition list result." diff --git a/specification/keyvault/data-plane/Microsoft.KeyVault/stable/2015-06-01/keyvault.json b/specification/keyvault/data-plane/Microsoft.KeyVault/stable/2015-06-01/keyvault.json index 46802fea6fdd..82f07dc5824c 100644 --- a/specification/keyvault/data-plane/Microsoft.KeyVault/stable/2015-06-01/keyvault.json +++ b/specification/keyvault/data-plane/Microsoft.KeyVault/stable/2015-06-01/keyvault.json @@ -2299,7 +2299,7 @@ "type": "integer", "format": "int32", "minimum": 0, - "description": "The duration that the ceritifcate is valid in months." + "description": "The duration that the certificate is valid in months." } }, "description": "Properties of the X509 component of a certificate." @@ -2479,7 +2479,7 @@ "email": { "x-ms-client-name": "EmailAddress", "type": "string", - "description": "Email addresss." + "description": "Email address." }, "phone": { "type": "string", @@ -2511,7 +2511,7 @@ "email": { "x-ms-client-name": "EmailAddress", "type": "string", - "description": "Email addresss." + "description": "Email address." }, "name": { "type": "string", diff --git a/specification/keyvault/data-plane/Microsoft.KeyVault/stable/2016-10-01/index.md b/specification/keyvault/data-plane/Microsoft.KeyVault/stable/2016-10-01/index.md index d65bfa10917e..ec4122cc584f 100644 --- a/specification/keyvault/data-plane/Microsoft.KeyVault/stable/2016-10-01/index.md +++ b/specification/keyvault/data-plane/Microsoft.KeyVault/stable/2016-10-01/index.md @@ -11,7 +11,7 @@ ms.manager: mbaldwin # Azure Key Vault -Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms, and enables the use of Hardware Security Modules (HSM) for high value customer keys. Key Vault also supports storage of secrets, limited size octet objects. Certificate management is also available through Key Vault including support for renewal processing and workign with a range of certificate authorities. +Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms, and enables the use of Hardware Security Modules (HSM) for high value customer keys. Key Vault also supports storage of secrets, limited size octet objects. Certificate management is also available through Key Vault including support for renewal processing and working with a range of certificate authorities. ## REST Operation Groups @@ -20,7 +20,7 @@ Azure Key Vault enables users to store and use cryptographic keys within the Mic |-----------------|-------------| |Keys | Operations for interacting with keys including create, import, update, and delete.| |Secrets | Operations for interacting with secrets including create, update, and delete.| -|Certificates | Operations for interacting with certificates including create, import, update, delete and a set of contact and renawal management tasks.| +|Certificates | Operations for interacting with certificates including create, import, update, delete and a set of contact and renewal management tasks.| |Storage | Operations for interacting with storage accounts including create, read, update, delete, list, regeneratekey and a set of sas definition related tasks.| ## See Also diff --git a/specification/keyvault/data-plane/Microsoft.KeyVault/stable/2016-10-01/keyvault.json b/specification/keyvault/data-plane/Microsoft.KeyVault/stable/2016-10-01/keyvault.json index c966bc6e254e..3a6f634db080 100644 --- a/specification/keyvault/data-plane/Microsoft.KeyVault/stable/2016-10-01/keyvault.json +++ b/specification/keyvault/data-plane/Microsoft.KeyVault/stable/2016-10-01/keyvault.json @@ -422,7 +422,7 @@ ], "operationId": "encrypt", "summary": "Encrypts an arbitrary sequence of bytes using an encryption key that is stored in a key vault.", - "description": "The ENCRYPT operation encrypts an arbitrary sequence of bytes using an encryption key that is stored in Azure Key Vault. Note that the ENCRYPT operation only supports a single block of data, the size of which is dependent on the target key and the encryption algorithm to be used. The ENCRYPT operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. This operation requires the keys/encypt permission.", + "description": "The ENCRYPT operation encrypts an arbitrary sequence of bytes using an encryption key that is stored in Azure Key Vault. Note that the ENCRYPT operation only supports a single block of data, the size of which is dependent on the target key and the encryption algorithm to be used. The ENCRYPT operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. This operation requires the keys/encrypt permission.", "parameters": [ { "name": "key-name", @@ -1363,7 +1363,7 @@ } } } - }, + }, "/certificates": { "get": { "tags": [ @@ -3066,7 +3066,7 @@ }, { "value": "Recoverable+Purgeable", - "description": "Soft-delete is enabled for this vault; A priveleged user may trigger an immediate, irreversible deletion(purge) of a deleted entity." + "description": "Soft-delete is enabled for this vault; A privileged user may trigger an immediate, irreversible deletion(purge) of a deleted entity." }, { "value": "Recoverable", @@ -3654,7 +3654,7 @@ "type": "integer", "format": "int32", "minimum": 0, - "description": "The duration that the ceritifcate is valid in months." + "description": "The duration that the certificate is valid in months." } }, "description": "Properties of the X509 component of a certificate." @@ -3834,7 +3834,7 @@ "email": { "x-ms-client-name": "EmailAddress", "type": "string", - "description": "Email addresss." + "description": "Email address." }, "phone": { "type": "string", @@ -3866,7 +3866,7 @@ "email": { "x-ms-client-name": "EmailAddress", "type": "string", - "description": "Email addresss." + "description": "Email address." }, "name": { "type": "string", @@ -4448,7 +4448,7 @@ } }, "description": "The backup secret result, containing the backup blob." - }, + }, "PendingCertificateSigningRequestResult": { "properties": { "value": { @@ -4742,7 +4742,7 @@ "nextLink": { "type": "string", "readOnly": true, - "description": "The URL to get the next set of SAS defintions." + "description": "The URL to get the next set of SAS definitions." } }, "description": "The storage account SAS definition list result." diff --git a/specification/keyvault/data-plane/Microsoft.KeyVault/stable/7.0/index.md b/specification/keyvault/data-plane/Microsoft.KeyVault/stable/7.0/index.md index d65bfa10917e..ec4122cc584f 100644 --- a/specification/keyvault/data-plane/Microsoft.KeyVault/stable/7.0/index.md +++ b/specification/keyvault/data-plane/Microsoft.KeyVault/stable/7.0/index.md @@ -11,7 +11,7 @@ ms.manager: mbaldwin # Azure Key Vault -Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms, and enables the use of Hardware Security Modules (HSM) for high value customer keys. Key Vault also supports storage of secrets, limited size octet objects. Certificate management is also available through Key Vault including support for renewal processing and workign with a range of certificate authorities. +Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms, and enables the use of Hardware Security Modules (HSM) for high value customer keys. Key Vault also supports storage of secrets, limited size octet objects. Certificate management is also available through Key Vault including support for renewal processing and working with a range of certificate authorities. ## REST Operation Groups @@ -20,7 +20,7 @@ Azure Key Vault enables users to store and use cryptographic keys within the Mic |-----------------|-------------| |Keys | Operations for interacting with keys including create, import, update, and delete.| |Secrets | Operations for interacting with secrets including create, update, and delete.| -|Certificates | Operations for interacting with certificates including create, import, update, delete and a set of contact and renawal management tasks.| +|Certificates | Operations for interacting with certificates including create, import, update, delete and a set of contact and renewal management tasks.| |Storage | Operations for interacting with storage accounts including create, read, update, delete, list, regeneratekey and a set of sas definition related tasks.| ## See Also diff --git a/specification/keyvault/data-plane/Microsoft.KeyVault/stable/7.0/keyvault.json b/specification/keyvault/data-plane/Microsoft.KeyVault/stable/7.0/keyvault.json index 1ce1520f2a45..133f7657c859 100644 --- a/specification/keyvault/data-plane/Microsoft.KeyVault/stable/7.0/keyvault.json +++ b/specification/keyvault/data-plane/Microsoft.KeyVault/stable/7.0/keyvault.json @@ -467,7 +467,7 @@ ], "operationId": "encrypt", "summary": "Encrypts an arbitrary sequence of bytes using an encryption key that is stored in a key vault.", - "description": "The ENCRYPT operation encrypts an arbitrary sequence of bytes using an encryption key that is stored in Azure Key Vault. Note that the ENCRYPT operation only supports a single block of data, the size of which is dependent on the target key and the encryption algorithm to be used. The ENCRYPT operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. This operation requires the keys/encypt permission.", + "description": "The ENCRYPT operation encrypts an arbitrary sequence of bytes using an encryption key that is stored in Azure Key Vault. Note that the ENCRYPT operation only supports a single block of data, the size of which is dependent on the target key and the encryption algorithm to be used. The ENCRYPT operation is only strictly necessary for symmetric keys stored in Azure Key Vault since protection with an asymmetric key can be performed using public portion of the key. This operation is supported for asymmetric keys as a convenience for callers that have a key-reference but do not have access to the public key material. This operation requires the keys/encrypt permission.", "parameters": [ { "name": "key-name", @@ -1019,7 +1019,7 @@ } }, "x-ms-examples": { - "Setsecret": { + "SetSecret": { "$ref": "./examples//SetSecret-example.json" } } @@ -4472,7 +4472,7 @@ "type": "integer", "format": "int32", "minimum": 0, - "description": "The duration that the ceritifcate is valid in months." + "description": "The duration that the certificate is valid in months." } }, "description": "Properties of the X509 component of a certificate." @@ -4657,7 +4657,7 @@ "email": { "x-ms-client-name": "EmailAddress", "type": "string", - "description": "Email addresss." + "description": "Email address." }, "phone": { "type": "string", @@ -4689,7 +4689,7 @@ "email": { "x-ms-client-name": "EmailAddress", "type": "string", - "description": "Email addresss." + "description": "Email address." }, "name": { "type": "string", @@ -5778,7 +5778,7 @@ "nextLink": { "type": "string", "readOnly": true, - "description": "The URL to get the next set of SAS defintions." + "description": "The URL to get the next set of SAS definitions." } }, "description": "The storage account SAS definition list result."