azure.keyvault.keys.aio package¶
-
class
azure.keyvault.keys.aio.
KeyClient
(vault_url: str, credential: TokenCredential, **kwargs: Any)[source]¶ A high-level asynchronous interface for managing a vault’s keys.
- Parameters
vault_url (str) – URL of the vault the client will access
credential – An object which can provide an access token for the vault, such as a credential from
azure.identity.aio
- Keyword Arguments
api_version (str) – version of the Key Vault API to use. Defaults to the most recent.
transport (AsyncHttpTransport) – transport to use. Defaults to
AioHttpTransport
.
Example
from azure.identity.aio import DefaultAzureCredential from azure.keyvault.keys.aio import KeyClient # Create a KeyClient using default Azure credentials credential = DefaultAzureCredential() key_client = KeyClient(vault_url, credential)
-
async
backup_key
(name: str, **kwargs: Any) → bytes[source]¶ Back up a key in a protected form useable only by Azure Key Vault. Requires key/backup permission.
This is intended to allow copying a key from one vault to another. Both vaults must be owned by the same Azure subscription. Also, backup / restore cannot be performed across geopolitical boundaries. For example, a backup from a vault in a USA region cannot be restored to a vault in an EU region.
- Parameters
name (str) – The name of the key to back up
- Return type
- Raises
ResourceNotFoundError
if the key doesn’t exist,HttpResponseError
for other errors
Example
# backup key key_backup = await key_client.backup_key(key_name) # returns the raw bytes of the backup print(key_backup)
-
async
create_ec_key
(name: str, **kwargs: Any) → azure.keyvault.keys._models.KeyVaultKey[source]¶ Create a new elliptic curve key or, if name is already in use, create a new version of the key.
Requires the keys/create permission.
- Parameters
name (str) – The name for the new key.
- Keyword Arguments
curve (KeyCurveName or str) – Elliptic curve name. Defaults to the NIST P-256 elliptic curve.
key_operations (list[KeyOperation or str]) – Allowed key operations
hardware_protected (bool) – Whether the key should be created in a hardware security module. Defaults to
False
.enabled (bool) – Whether the key is enabled for use.
tags (dict[str, str]) – Application specific metadata in the form of key-value pairs.
not_before (datetime) – Not before date of the key in UTC
expires_on (datetime) – Expiry date of the key in UTC
- Returns
The created key
- Return type
- Raises
Example
# create an elliptic curve (ec) key key_curve = "P-256" ec_key = await key_client.create_ec_key("key-name", curve=key_curve) print(ec_key.id) print(ec_key.name) print(ec_key.key_type) print(ec_key.key.crv)
-
async
create_key
(name: str, key_type: Union[str, KeyType], **kwargs: Any) → azure.keyvault.keys._models.KeyVaultKey[source]¶ Create a key or, if name is already in use, create a new version of the key.
Requires keys/create permission.
- Parameters
- Keyword Arguments
size (int) – RSA key size in bits, for example 2048, 3072, or 4096. Applies only to RSA keys. To create an RSA key, consider using
create_rsa_key()
instead.curve (KeyCurveName or str) – Elliptic curve name. Applies only to elliptic curve keys. Defaults to the NIST P-256 elliptic curve. To create an elliptic curve key, consider using
create_ec_key()
instead.key_operations (list[KeyOperation or str]) – Allowed key operations
enabled (bool) – Whether the key is enabled for use.
tags (dict[str, str]) – Application specific metadata in the form of key-value pairs.
not_before (datetime) – Not before date of the key in UTC
expires_on (datetime) – Expiry date of the key in UTC
- Returns
The created key
- Return type
- Raises
Example
from dateutil import parser as date_parse key_size = 2048 key_ops = ["encrypt", "decrypt", "sign", "verify", "wrapKey", "unwrapKey"] expires_on = date_parse.parse("2050-02-02T08:00:00.000Z") # create a key with optional arguments key = await key_client.create_key("key-name", "RSA", size=key_size, key_operations=key_ops, expires_on=expires_on) print(key.id) print(key.name) print(key.key_type) print(key.properties.enabled) print(key.properties.expires_on)
-
async
create_rsa_key
(name: str, **kwargs: Any) → azure.keyvault.keys._models.KeyVaultKey[source]¶ Create a new RSA key or, if name is already in use, create a new version of the key
Requires the keys/create permission.
- Parameters
name (str) – The name for the new key.
- Keyword Arguments
size (int) – Key size in bits, for example 2048, 3072, or 4096.
hardware_protected (bool) – Whether the key should be created in a hardware security module. Defaults to
False
.key_operations (list[KeyOperation or str]) – Allowed key operations
enabled (bool) – Whether the key is enabled for use.
tags (dict[str, str]) – Application specific metadata in the form of key-value pairs.
not_before (datetime) – Not before date of the key in UTC
expires_on (datetime) – Expiry date of the key in UTC
- Returns
The created key
- Return type
- Raises
Example
# create an rsa key in a hardware security module key = await key_client.create_rsa_key("key-name", hardware_protected=True, size=2048) print(key.id) print(key.name) print(key.key_type)
-
async
delete_key
(name: str, **kwargs: Any) → azure.keyvault.keys._models.DeletedKey[source]¶ Delete all versions of a key and its cryptographic material. Requires keys/delete permission.
If the vault has soft-delete enabled, deletion may take several seconds to complete.
- Parameters
name (str) – The name of the key to delete
- Returns
The deleted key
- Return type
- Raises
ResourceNotFoundError
if the key doesn’t exist,HttpResponseError
for other errors
Example
# delete a key deleted_key = await key_client.delete_key("key-name") print(deleted_key.name) # if the vault has soft-delete enabled, the key's # scheduled purge date, deleted_date and recovery id are set print(deleted_key.deleted_date) print(deleted_key.scheduled_purge_date) print(deleted_key.recovery_id)
-
async
get_deleted_key
(name: str, **kwargs: Any) → azure.keyvault.keys._models.DeletedKey[source]¶ Get a deleted key. Possible only in a vault with soft-delete enabled. Requires keys/get permission.
- Parameters
name (str) – The name of the key
- Returns
The deleted key
- Return type
- Raises
ResourceNotFoundError
if the key doesn’t exist,HttpResponseError
for other errors
Example
# get a deleted key (requires soft-delete enabled for the vault) deleted_key = await key_client.get_deleted_key("key-name") print(deleted_key.name)
-
async
get_key
(name: str, version: Optional[str] = None, **kwargs: Any) → azure.keyvault.keys._models.KeyVaultKey[source]¶ Get a key’s attributes and, if it’s an asymmetric key, its public material. Requires keys/get permission.
- Parameters
- Return type
- Raises
ResourceNotFoundError
if the key doesn’t exist,HttpResponseError
for other errors
Example
# get the latest version of a key key = await key_client.get_key("key-name") # alternatively, specify a version key_version = key.properties.version key = await key_client.get_key("key-name", key_version) print(key.id) print(key.name) print(key.properties.version) print(key.key_type) print(key.properties.vault_url)
-
async
import_key
(name: str, key: azure.keyvault.keys._models.JsonWebKey, **kwargs: Any) → azure.keyvault.keys._models.KeyVaultKey[source]¶ Import a key created externally. Requires keys/import permission.
If name is already in use, the key will be imported as a new version.
- Parameters
name (str) – Name for the imported key
key (JsonWebKey) – The JSON web key to import
- Keyword Arguments
hardware_protected (bool) – Whether the key should be backed by a hardware security module
enabled (bool) – Whether the key is enabled for use.
tags (dict[str, str]) – Application specific metadata in the form of key-value pairs.
not_before (datetime) – Not before date of the key in UTC
expires_on (datetime) – Expiry date of the key in UTC
- Returns
The imported key
- Return type
- Raises
-
list_deleted_keys
(**kwargs: Any) → AsyncIterable[DeletedKey][source]¶ List all deleted keys, including the public part of each. Possible only in a vault with soft-delete enabled.
Requires keys/list permission.
- Returns
An iterator of deleted keys
- Return type
Example
# get an iterator of deleted keys (requires soft-delete enabled for the vault) deleted_keys = key_client.list_deleted_keys() async for key in deleted_keys: print(key.id) print(key.name) print(key.scheduled_purge_date) print(key.recovery_id) print(key.deleted_date)
-
list_properties_of_key_versions
(name: str, **kwargs: Any) → AsyncIterable[KeyProperties][source]¶ List the identifiers and properties of a key’s versions. Requires keys/list permission.
- Parameters
name (str) – The name of the key
- Returns
An iterator of keys without their cryptographic material
- Return type
Example
# get an iterator of all versions of a key key_versions = key_client.list_properties_of_key_versions("key-name") async for key in key_versions: print(key.id) print(key.updated_on) print(key.properties.version) print(key.expires_on)
-
list_properties_of_keys
(**kwargs: Any) → AsyncIterable[KeyProperties][source]¶ List identifiers and properties of all keys in the vault. Requires keys/list permission.
- Returns
An iterator of keys without their cryptographic material or version information
- Return type
Example
# list keys keys = key_client.list_properties_of_keys() async for key in keys: print(key.id) print(key.created_on) print(key.name) print(key.updated_on) print(key.enabled)
-
async
purge_deleted_key
(name: str, **kwargs: Any) → None[source]¶ Permanently delete a deleted key. Only possible in a vault with soft-delete enabled.
If the vault does not have soft-delete enabled,
delete_key()
is permanent, and this method will return an error.Requires keys/purge permission.
- Parameters
name (str) – The name of the deleted key to purge
- Returns
None
- Raises
Example
# if the vault has soft-delete enabled, purge permanently deletes a deleted key # (with soft-delete disabled, delete_key is permanent) await key_client.purge_deleted_key("key-name")
-
async
recover_deleted_key
(name: str, **kwargs: Any) → azure.keyvault.keys._models.KeyVaultKey[source]¶ Recover a deleted key to its latest version. Possible only in a vault with soft-delete enabled.
Requires keys/recover permission. If the vault does not have soft-delete enabled,
delete_key()
is permanent, and this method will raise an error. Attempting to recover a non-deleted key will also raise an error.- Parameters
name (str) – The name of the deleted key
- Returns
The recovered key
- Return type
- Raises
Example
# recover deleted key to its latest version (requires soft-delete enabled for the vault) recovered_key = await key_client.recover_deleted_key("key-name") print(recovered_key.id) print(recovered_key.name)
-
async
restore_key_backup
(backup: bytes, **kwargs: Any) → azure.keyvault.keys._models.KeyVaultKey[source]¶ Restore a key backup to the vault. Requires keys/restore permission.
This imports all versions of the key, with its name, attributes, and access control policies. If the key’s name is already in use, restoring it will fail. Also, the target vault must be owned by the same Microsoft Azure subscription as the source vault.
- Parameters
backup (bytes) – A key backup as returned by
backup_key()
- Returns
The restored key
- Return type
- Raises
ResourceExistsError
if the backed up key’s name is already in use,HttpResponseError
for other errors
Example
# restores a backup restored_key = await key_client.restore_key_backup(key_backup) print(restored_key.id) print(restored_key.name) print(restored_key.properties.version)
-
async
update_key_properties
(name: str, version: Optional[str] = None, **kwargs: Any) → azure.keyvault.keys._models.KeyVaultKey[source]¶ Change a key’s properties (not its cryptographic material). Requires keys/update permission.
- Parameters
- Keyword Arguments
key_operations (list[KeyOperation or str]) – Allowed key operations
enabled (bool) – Whether the key is enabled for use.
tags (dict[str, str]) – Application specific metadata in the form of key-value pairs.
not_before (datetime) – Not before date of the key in UTC
expires_on (datetime) – Expiry date of the key in UTC
- Returns
The updated key
- Return type
- Raises
ResourceNotFoundError
if the key doesn’t exist,HttpResponseError
for other errors
Example
# update attributes of an existing key expires_on = date_parse.parse("2050-01-02T08:00:00.000Z") tags = {"foo": "updated tag"} updated_key = await key_client.update_key_properties(key.name, expires_on=expires_on, tags=tags) print(updated_key.properties.version) print(updated_key.properties.updated_on) print(updated_key.properties.expires_on) print(updated_key.properties.tags) print(updated_key.key_type)
-
property
vault_url
¶