Azure IoT shared access key
If you're not an E5 customer, use the 90-day Microsoft Purview solutions trial to explore how additional Purview capabilities can help your organization manage data security and compliance needs. Start now at the Microsoft Purview compliance portal trials hub. Learn details about signing up and trial terms.
A combination of 44-characters consisting of letters, digits, and special characters ending with and equals sign that isn't part of the pattern.
Any combination of 43 characters consisting of:
- a-z (not case-sensitive)
- forward slashes (/)
- or plus signs (+)
- ends with an equal sign (=) that isn't part of the pattern.
When keyword highlighting is supported in the contextual summary for a sensitive information type or a trainable classifier, in the Contextual Summary view of activity explorer, the keywords in a document that were matched to a policy are highlighted.
This SIT is designed to match the security information that's used to authenticate Azure IoT devices and services.
It uses several primary resources:
- Patterns of Base64 encoded 256-bits symmetric key.
- Patterns of CredentialName, CredentialFeatures, AccountIdentityName, AccountIdentityValue, ResourceType, ResourceName, ID.
- Patterns of mockup values, redactions, and placeholders.
- A dictionary of vocabulary.
The patterns are designed to match actual credentials with reasonable confidence. The patterns don't match credentials formatted as examples. Mockup values, redacted values, and placeholders, like credential type or usage descriptions, in the position where an actual secret value should present won't be matched.