Microsoft.Rest.ClientRuntime 2.3.24

Infrastructure for error handling, tracing, and HttpClient pipeline configuration. Required by client libraries generated using AutoRest.

Showing the top 20 packages that depend on Microsoft.Rest.ClientRuntime.

Packages Downloads
Microsoft.Azure.CognitiveServices.Search.WebSearch
This client library provides access to the Microsoft Cognitive Services Web Search API.
431
Microsoft.Rest.ClientRuntime.Azure
Provides common error handling, tracing, and HTTP/REST-based pipeline manipulation.
421
Microsoft.Azure.CognitiveServices.Search.EntitySearch
This client library provides access to the Microsoft Cognitive Services Entity Search API.
177
Microsoft.Azure.KeyVault
Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value customer keys. In addition, Azure Key Vault allows users to securely store secrets in a Key Vault; secrets are limited size octet objects and Azure Key Vault applies no specific semantics to these objects. A Key Vault may contain a mix of keys and secrets at the same time, and access control for the two types of object is independently controlled. Users, subject to appropriate authorization, may: 1) Manage cryptographic keys using Create, Import, Update, Delete and other operations 2) Manage secrets using Get, Set, Delete and other operations 3) Use cryptographic keys with Sign/Verify, WrapKey/UnwrapKey and Encrypt/Decrypt operations. Operations against Key Vaults are authenticated and authorized using Azure Active Directory. Key Vault now supports certificates, a complex type that makes use of existing key and secret infrastructure for certificate operations. KV certificates also support notification and auto-renewal as well as other management features.
10
Microsoft.Azure.KeyVault
Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value customer keys. In addition, Azure Key Vault allows users to securely store secrets in a Key Vault; secrets are limited size octet objects and Azure Key Vault applies no specific semantics to these objects. A Key Vault may contain a mix of keys and secrets at the same time, and access control for the two types of object is independently controlled. Users, subject to appropriate authorization, may: 1) Manage cryptographic keys using Create, Import, Update, Delete and other operations 2) Manage secrets using Get, Set, Delete and other operations 3) Use cryptographic keys with Sign/Verify, WrapKey/UnwrapKey and Encrypt/Decrypt operations. Operations against Key Vaults are authenticated and authorized using Azure Active Directory.
10
Microsoft.Rest.ClientRuntime.Azure
Provides common error handling, tracing, and HTTP/REST-based pipeline manipulation.
9
Microsoft.Azure.KeyVault
Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value customer keys. In addition, Azure Key Vault allows users to securely store secrets in a Key Vault; secrets are limited size octet objects and Azure Key Vault applies no specific semantics to these objects. A Key Vault may contain a mix of keys and secrets at the same time, and access control for the two types of object is independently controlled. Users, subject to appropriate authorization, may: 1) Manage cryptographic keys using Create, Import, Update, Delete and other operations 2) Manage secrets using Get, Set, Delete and other operations 3) Use cryptographic keys with Sign/Verify, WrapKey/UnwrapKey and Encrypt/Decrypt operations. Operations against Key Vaults are authenticated and authorized using Azure Active Directory. Key Vault now supports certificates, a complex type that makes use of existing key and secret infrastructure for certificate operations. KV certificates also support notification and auto-renewal as well as other management features. This library has been replaced by the following new Azure SDKs. You can read about the new Azure SDKs at https://aka.ms/azsdkvalueprop. The latest libraries to interact with the Azure KeyVault service are: * https://www.nuget.org/packages/Azure.Security.KeyVault.Keys * https://www.nuget.org/packages/Azure.Security.KeyVault.Secrets * https://www.nuget.org/packages/Azure.Security.KeyVault.Certificates It is recommended that you move to the new package.
9
Microsoft.Azure.KeyVault
Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value customer keys. In addition, Azure Key Vault allows users to securely store secrets in a Key Vault; secrets are limited size octet objects and Azure Key Vault applies no specific semantics to these objects. A Key Vault may contain a mix of keys and secrets at the same time, and access control for the two types of object is independently controlled. Users, subject to appropriate authorization, may: 1) Manage cryptographic keys using Create, Import, Update, Delete and other operations 2) Manage secrets using Get, Set, Delete and other operations 3) Use cryptographic keys with Sign/Verify, WrapKey/UnwrapKey and Encrypt/Decrypt operations. Operations against Key Vaults are authenticated and authorized using Azure Active Directory. Key Vault now supports certificates, a complex type that makes use of existing key and secret infrastructure for certificate operations. KV certificates also support notification and auto-renewal as well as other management features.
9
Microsoft.Rest.ClientRuntime.Azure
Provides common error handling, tracing, and HTTP/REST-based pipeline manipulation. Supported Platforms: - Portable Class Libraries - .NET Framework 4.5 - Windows 8 - Windows Phone 8.1 - DotNet Core
8
Microsoft.Rest.ClientRuntime.Azure
Provides common error handling, tracing, and HTTP/REST-based pipeline manipulation.
8
Microsoft.Azure.KeyVault.WebKey
Microsoft Azure Key Vault WebKey Class Library This library has been replaced by the following new Azure SDKs. You can read about the new Azure SDKs at https://aka.ms/azsdkvalueprop. The latest libraries to interact with the Azure KeyVault service are: * https://www.nuget.org/packages/Azure.Security.KeyVault.Keys * https://www.nuget.org/packages/Azure.Security.KeyVault.Secrets * https://www.nuget.org/packages/Azure.Security.KeyVault.Certificates It is recommended that you move to the new package.
8
Microsoft.Azure.KeyVault
Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value customer keys. In addition, Azure Key Vault allows users to securely store secrets in a Key Vault; secrets are limited size octet objects and Azure Key Vault applies no specific semantics to these objects. A Key Vault may contain a mix of keys and secrets at the same time, and access control for the two types of object is independently controlled. Users, subject to appropriate authorization, may: 1) Manage cryptographic keys using Create, Import, Update, Delete and other operations 2) Manage secrets using Get, Set, Delete and other operations 3) Use cryptographic keys with Sign/Verify, WrapKey/UnwrapKey and Encrypt/Decrypt operations. Operations against Key Vaults are authenticated and authorized using Azure Active Directory. Key Vault now supports certificates, a complex type that makes use of existing key and secret infrastructure for certificate operations. KV certificates also support notification and auto-renewal as well as other management features.
8
Microsoft.Azure.KeyVault
Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value customer keys. In addition, Azure Key Vault allows users to securely store secrets in a Key Vault; secrets are limited size octet objects and Azure Key Vault applies no specific semantics to these objects. A Key Vault may contain a mix of keys and secrets at the same time, and access control for the two types of object is independently controlled. Users, subject to appropriate authorization, may: 1) Manage cryptographic keys using Create, Import, Update, Delete and other operations 2) Manage secrets using Get, Set, Delete and other operations 3) Use cryptographic keys with Sign/Verify, WrapKey/UnwrapKey and Encrypt/Decrypt operations. Operations against Key Vaults are authenticated and authorized using Azure Active Directory.
8

- Improving sanitization of exception messages. For details, see "CVE-2022-26907 - Security Update Guide - Microsoft - Azure SDK for .NET Information Disclosure Vulnerability": https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26907 - Optimize performance of parsing JSON content

.NET Framework 4.6.1

.NET Framework 4.5.2

.NET Standard 1.4

.NET Standard 2.0

Version Downloads Last updated
2.3.24 9 04/29/2024
2.3.23 7 03/31/2024
2.3.22 8 03/31/2024
2.3.21 5 03/31/2024
2.3.20 7 03/31/2024
2.3.19 7 03/31/2024
2.3.18 422 03/25/2024
2.3.17 8 03/31/2024
2.3.16 7 03/31/2024
2.3.15 8 03/31/2024
2.3.14 9 03/31/2024
2.3.13 8 03/31/2024
2.3.12 6 03/30/2024
2.3.11 8 03/30/2024
2.3.10 6 03/30/2024
2.3.9 9 03/31/2024
2.3.8 6 03/30/2024
2.3.7 8 03/30/2024
2.3.6 5 04/29/2024
2.3.5 10 03/30/2024
2.3.4 4 03/30/2024
2.3.3 8 03/30/2024
2.3.2 7 03/30/2024
2.3.1 6 03/30/2024
2.3.0 8 03/30/2024
2.2.0 8 03/30/2024
2.1.0 8 03/30/2024
2.0.1 8 03/30/2024
2.0.0 7 03/30/2024
1.8.2 7 03/30/2024
1.8.1 7 03/30/2024
1.8.0 7 03/30/2024
1.4.1 9 03/30/2024
1.3.0 6 03/30/2024
1.2.0 8 03/30/2024
1.0.2 6 03/30/2024
0.9.6 9 03/30/2024