Microsoft.Rest.ClientRuntime 2.3.9
Infrastructure for error handling, tracing, and HttpClient pipeline configuration. Required by client libraries generated using AutoRest.
Showing the top 20 packages that depend on Microsoft.Rest.ClientRuntime.
Packages | Downloads |
---|---|
KubernetesClient
Client library for the Kubernetes open source container orchestrator.
|
6 |
KubernetesClient
Client library for the Kubernetes open source container orchestrator.
|
7 |
KubernetesClient
Client library for the Kubernetes open source container orchestrator.
|
13 |
Microsoft.Azure.KeyVault
Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value customer keys. In addition, Azure Key Vault allows users to securely store secrets in a Key Vault; secrets are limited size octet objects and Azure Key Vault applies no specific semantics to these objects. A Key Vault may contain a mix of keys and secrets at the same time, and access control for the two types of object is independently controlled. Users, subject to appropriate authorization, may: 1) Manage cryptographic keys using Create, Import, Update, Delete and other operations 2) Manage secrets using Get, Set, Delete and other operations 3) Use cryptographic keys with Sign/Verify, WrapKey/UnwrapKey and Encrypt/Decrypt operations. Operations against Key Vaults are authenticated and authorized using Azure Active Directory.
|
6 |
Microsoft.Azure.KeyVault
Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value customer keys. In addition, Azure Key Vault allows users to securely store secrets in a Key Vault; secrets are limited size octet objects and Azure Key Vault applies no specific semantics to these objects. A Key Vault may contain a mix of keys and secrets at the same time, and access control for the two types of object is independently controlled. Users, subject to appropriate authorization, may: 1) Manage cryptographic keys using Create, Import, Update, Delete and other operations 2) Manage secrets using Get, Set, Delete and other operations 3) Use cryptographic keys with Sign/Verify, WrapKey/UnwrapKey and Encrypt/Decrypt operations. Operations against Key Vaults are authenticated and authorized using Azure Active Directory. Key Vault now supports certificates, a complex type that makes use of existing key and secret infrastructure for certificate operations. KV certificates also support notification and auto-renewal as well as other management features.
|
6 |
Microsoft.Azure.KeyVault
Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value customer keys. In addition, Azure Key Vault allows users to securely store secrets in a Key Vault; secrets are limited size octet objects and Azure Key Vault applies no specific semantics to these objects. A Key Vault may contain a mix of keys and secrets at the same time, and access control for the two types of object is independently controlled. Users, subject to appropriate authorization, may: 1) Manage cryptographic keys using Create, Import, Update, Delete and other operations 2) Manage secrets using Get, Set, Delete and other operations 3) Use cryptographic keys with Sign/Verify, WrapKey/UnwrapKey and Encrypt/Decrypt operations. Operations against Key Vaults are authenticated and authorized using Azure Active Directory. Key Vault now supports certificates, a complex type that makes use of existing key and secret infrastructure for certificate operations. KV certificates also support notification and auto-renewal as well as other management features.
|
7 |
Microsoft.Azure.KeyVault
Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value customer keys. In addition, Azure Key Vault allows users to securely store secrets in a Key Vault; secrets are limited size octet objects and Azure Key Vault applies no specific semantics to these objects. A Key Vault may contain a mix of keys and secrets at the same time, and access control for the two types of object is independently controlled. Users, subject to appropriate authorization, may: 1) Manage cryptographic keys using Create, Import, Update, Delete and other operations 2) Manage secrets using Get, Set, Delete and other operations 3) Use cryptographic keys with Sign/Verify, WrapKey/UnwrapKey and Encrypt/Decrypt operations. Operations against Key Vaults are authenticated and authorized using Azure Active Directory. Key Vault now supports certificates, a complex type that makes use of existing key and secret infrastructure for certificate operations. KV certificates also support notification and auto-renewal as well as other management features.
|
8 |
Microsoft.Azure.KeyVault
Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value customer keys. In addition, Azure Key Vault allows users to securely store secrets in a Key Vault; secrets are limited size octet objects and Azure Key Vault applies no specific semantics to these objects. A Key Vault may contain a mix of keys and secrets at the same time, and access control for the two types of object is independently controlled. Users, subject to appropriate authorization, may: 1) Manage cryptographic keys using Create, Import, Update, Delete and other operations 2) Manage secrets using Get, Set, Delete and other operations 3) Use cryptographic keys with Sign/Verify, WrapKey/UnwrapKey and Encrypt/Decrypt operations. Operations against Key Vaults are authenticated and authorized using Azure Active Directory. Key Vault now supports certificates, a complex type that makes use of existing key and secret infrastructure for certificate operations. KV certificates also support notification and auto-renewal as well as other management features.
This library has been replaced by the following new Azure SDKs. You can read about the new Azure SDKs at https://aka.ms/azsdkvalueprop.
The latest libraries to interact with the Azure KeyVault service are:
* https://www.nuget.org/packages/Azure.Security.KeyVault.Keys
* https://www.nuget.org/packages/Azure.Security.KeyVault.Secrets
* https://www.nuget.org/packages/Azure.Security.KeyVault.Certificates
It is recommended that you move to the new package.
|
9 |
Microsoft.Rest.ClientRuntime.Azure
Provides common error handling, tracing, and HTTP/REST-based pipeline manipulation.
|
6 |
Microsoft.Rest.ClientRuntime.Azure
Provides common error handling, tracing, and HTTP/REST-based pipeline manipulation.
|
7 |
Microsoft.Rest.ClientRuntime.Azure
Provides common error handling, tracing, and HTTP/REST-based pipeline manipulation.
Supported Platforms:
- Portable Class Libraries
- .NET Framework 4.5
- Windows 8
- Windows Phone 8.1
|
6 |
Microsoft.Rest.ClientRuntime.Azure
Provides common error handling, tracing, and HTTP/REST-based pipeline manipulation.
Supported Platforms:
- Portable Class Libraries
- .NET Framework 4.5
- Windows 8
- Windows Phone 8.1
- DotNet Core
|
9 |
.NET Framework 4.5.2
- Newtonsoft.Json (>= 6.0.8)
.NET Standard 1.4
- NETStandard.Library (>= 1.6.1)
- Newtonsoft.Json (>= 9.0.1)
Version | Downloads | Last updated |
---|---|---|
2.3.24 | 23 | 06/30/2022 |
2.3.23 | 4 | 04/14/2022 |
2.3.22 | 5 | 05/03/2024 |
2.3.21 | 0 | 11/20/2019 |
2.3.20 | 8 | 05/03/2024 |
2.3.19 | 4 | 05/02/2024 |
2.3.18 | 3 | 05/06/2024 |
2.3.17 | 8 | 05/03/2024 |
2.3.16 | 0 | 10/24/2018 |
2.3.15 | 5 | 05/04/2024 |
2.3.14 | 11 | 05/03/2024 |
2.3.13 | 5 | 05/04/2024 |
2.3.12 | 7 | 05/03/2024 |
2.3.11 | 3 | 05/25/2024 |
2.3.10 | 1,182 | 05/14/2022 |
2.3.9 | 3 | 05/02/2024 |
2.3.8 | 5 | 05/08/2024 |
2.3.7 | 9 | 05/07/2024 |
2.3.6 | 6 | 05/06/2024 |
2.3.5 | 4 | 05/25/2024 |
2.3.4 | 4 | 05/03/2024 |
2.3.3 | 6 | 05/02/2024 |
2.3.2 | 5 | 04/18/2024 |
2.3.1 | 3 | 05/08/2024 |
2.3.0 | 4 | 05/25/2024 |
2.2.0 | 5 | 05/25/2024 |
2.1.0 | 4 | 05/07/2024 |
2.0.1 | 3 | 05/03/2024 |
2.0.0 | 7 | 05/09/2024 |
1.8.2 | 4 | 05/13/2024 |
1.8.1 | 4 | 05/11/2024 |
1.8.0 | 5 | 05/06/2024 |
1.4.1 | 3 | 05/25/2024 |
1.3.0 | 7 | 05/19/2024 |
1.2.0 | 4 | 05/14/2024 |
1.0.2 | 4 | 05/02/2024 |
0.9.6 | 8 | 05/02/2024 |