Microsoft.Rest.ClientRuntime 2.3.24
Infrastructure for error handling, tracing, and HttpClient pipeline configuration. Required by client libraries generated using AutoRest.
Showing the top 20 packages that depend on Microsoft.Rest.ClientRuntime.
| Packages | Downloads |
|---|---|
|
KubernetesClient
Client library for the Kubernetes open source container orchestrator.
|
3 |
|
Microsoft.Rest.ClientRuntime.Azure.Authentication
Provides ADAL based authentication for Azure management client libraries
|
3 |
|
Microsoft.Rest.ClientRuntime.Azure
Provides common error handling, tracing, and HTTP/REST-based pipeline manipulation.
Supported Platforms:
- Portable Class Libraries
- .NET Framework 4.5
- Windows 8
- Windows Phone 8.1
- DotNet Core
|
3 |
|
Microsoft.Azure.KeyVault
Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value customer keys. In addition, Azure Key Vault allows users to securely store secrets in a Key Vault; secrets are limited size octet objects and Azure Key Vault applies no specific semantics to these objects. A Key Vault may contain a mix of keys and secrets at the same time, and access control for the two types of object is independently controlled. Users, subject to appropriate authorization, may: 1) Manage cryptographic keys using Create, Import, Update, Delete and other operations 2) Manage secrets using Get, Set, Delete and other operations 3) Use cryptographic keys with Sign/Verify, WrapKey/UnwrapKey and Encrypt/Decrypt operations. Operations against Key Vaults are authenticated and authorized using Azure Active Directory.
|
3 |
|
KubernetesClient
Client library for the Kubernetes open source container orchestrator.
|
2 |
|
Microsoft.Azure.KeyVault
Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value customer keys. In addition, Azure Key Vault allows users to securely store secrets in a Key Vault; secrets are limited size octet objects and Azure Key Vault applies no specific semantics to these objects. A Key Vault may contain a mix of keys and secrets at the same time, and access control for the two types of object is independently controlled. Users, subject to appropriate authorization, may: 1) Manage cryptographic keys using Create, Import, Update, Delete and other operations 2) Manage secrets using Get, Set, Delete and other operations 3) Use cryptographic keys with Sign/Verify, WrapKey/UnwrapKey and Encrypt/Decrypt operations. Operations against Key Vaults are authenticated and authorized using Azure Active Directory.
|
2 |
|
Microsoft.Azure.Search.Service
Use this package if you're developing automation in .NET to manage Azure Cognitive Search indexes, synonym maps, indexers, data sources, or other service-level resources. If you only need to query or update documents in your indexes, use the Microsoft.Azure.Search.Data package instead. If you need all the functionality of Azure Cognitive Search, use the Microsoft.Azure.Search package instead.
|
2 |
|
Microsoft.Rest.ClientRuntime.Azure
Provides common error handling, tracing, and HTTP/REST-based pipeline manipulation.
|
2 |
|
Microsoft.Rest.ClientRuntime.Azure
Provides common error handling, tracing, and HTTP/REST-based pipeline manipulation.
Supported Platforms:
- Portable Class Libraries
- .NET Framework 4.5
- Windows 8
- Windows Phone 8.1
- DotNet Core
|
2 |
.NET Framework 4.6.1
- Newtonsoft.Json (>= 10.0.3)
.NET Framework 4.5.2
- Newtonsoft.Json (>= 6.0.8)
.NET Standard 1.4
- NETStandard.Library (>= 1.6.1)
- Newtonsoft.Json (>= 10.0.3)
.NET Standard 2.0
- Newtonsoft.Json (>= 10.0.3)
| Version | Downloads | Last updated |
|---|---|---|
| 2.3.24 | 0 | 04/12/2022 |
| 2.3.23 | 3 | 12/10/2025 |
| 2.3.22 | 0 | 09/30/2020 |
| 2.3.21 | 2 | 12/12/2025 |
| 2.3.20 | 2 | 12/12/2025 |
| 2.3.19 | 3 | 12/12/2025 |
| 2.3.18 | 2 | 12/12/2025 |
| 2.3.17 | 1 | 12/12/2025 |
| 2.3.16 | 1 | 12/10/2025 |
| 2.3.15 | 1 | 12/12/2025 |
| 2.3.14 | 2 | 12/11/2025 |
| 2.3.13 | 1 | 12/12/2025 |
| 2.3.12 | 0 | 07/19/2018 |
| 2.3.11 | 0 | 03/23/2018 |
| 2.3.10 | 2 | 12/10/2025 |
| 2.3.9 | 0 | 08/07/2017 |
| 2.3.8 | 0 | 05/22/2017 |
| 2.3.7 | 2 | 12/12/2025 |
| 2.3.6 | 5 | 12/10/2025 |
| 2.3.5 | 1 | 12/12/2025 |
| 2.3.4 | 2 | 12/10/2025 |
| 2.3.3 | 1 | 12/10/2025 |
| 2.3.2 | 0 | 07/22/2016 |
| 2.3.1 | 2 | 12/11/2025 |
| 2.3.0 | 3 | 12/10/2025 |
| 2.2.0 | 1 | 12/11/2025 |
| 2.1.0 | 2 | 12/11/2025 |
| 2.0.1 | 2 | 12/12/2025 |
| 2.0.0 | 1 | 12/10/2025 |
| 1.8.2 | 1 | 12/12/2025 |
| 1.8.1 | 3 | 12/12/2025 |
| 1.8.0 | 2 | 12/12/2025 |
| 1.4.1 | 1 | 12/12/2025 |
| 1.3.0 | 2 | 12/12/2025 |
| 1.2.0 | 1 | 12/12/2025 |
| 1.0.2 | 1 | 12/12/2025 |
| 0.9.6 | 1 | 12/12/2025 |