[FEATURE REQ] Retrieve certificate with private key using Azure.Security.KeyVault.Certificates.CertificateClient / KeyVaultCertificate
See original GitHub issueLibrary or service name.
Azure.Security.KeyVault.Certificates
Is your feature request related to a problem? Please describe.
KeyVaultCertificate
only exposes the public key, and for the private key the Azure.Security.KeyVault.Secrets
must be used, where a x509certificate2
must be manually constructed from the byte array.
It would be more convenient to have the option to use the CertificateClient
to get a x509certificate2
directly. It would also be more consistent with the import API, which does mandate the private key to reside in the cert. So if I upload the private key, it makes sense for me to be able to download it - if I drew an analogy to secrets, it would be having to use one library to create a secret and another library to retrieve it…
Issue Analytics
- State:
- Created 3 years ago
- Reactions:6
- Comments:11 (6 by maintainers)
Top GitHub Comments
Our preview out now includes APIs for parsing the URI.
The
ParseSecretName
method in your sample should be part of the library, IMO.In the UI, or the CLI, everything I touch is a certificate. But in code, I need to get a secret?
And, the Secrets SDK requires a string, but the certificate SDK gives me a URI (?!?)
I’m sure there is a good reason that the certificate points to a specific secret version/instance using a URI. How about an overload in the Secrets API that accepts a URI? Making the consumer find this thread/sample to put the pieces together is sub-optimal.