You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Change WARNING to IMPORTANT for less alarming tone
- Add explicit statement that access policies remain fully supported
- Clarify change only affects NEW vaults, existing vaults unaffected
- Remove 'breaks compatibility' language
- Update Step 3 labels for clarity
- Rename Step 5 with affirming opening statement
Addresses customer feedback that original wording implied access policies are being deprecated.
# Prepare for Key Vault API version 2026-02-01: Azure RBAC as default access control
17
17
18
-
> [!WARNING]
19
-
> Starting February 2026, Azure Key Vault API version 2026-02-01 establishes Azure RBAC as the default access control model. All API versions before 2026-02-01 retire on February 27, 2027.
18
+
> [!IMPORTANT]
19
+
> Starting February 2026, Azure Key Vault API version 2026-02-01 changes the default for **new vaults** to Azure RBAC. Existing vaults are unaffected. All API versions before 2026-02-01 retire on February 27, 2027. **Access policies remain fully supported.**
20
20
>
21
-
> This change breaks compatibility. Before February 27, 2027, you **must either**:
22
-
> -**Azure RBAC (recommended)**: [Set new and existing vaults to Azure RBAC](#step-4-migrate-to-azure-rbac-recommended)and adopt API version 2026-02-01 or later.
23
-
> -**Access policies (legacy)**: [Set new vaults to use access policies](#step-5-continue-using-access-policies) and adopt API version 2026-02-01 or later.
21
+
> Before February 27, 2027, adopt API version 2026-02-01 or later:
22
+
> -**Azure RBAC (recommended)**: [Migrate to Azure RBAC](#step-4-migrate-to-azure-rbac-recommended)for improved security.
23
+
> -**Access policies (legacy)**: [Continue using access policies](#step-5-use-access-policies-for-new-vaults) by setting `enableRbacAuthorization` to `false` when creating new vaults.
24
24
>
25
25
> **Azure Cloud Shell users**: Cloud Shell always uses the latest API version, so you'll automatically start using API version 2026-02-01 as soon as it releases. Follow the steps in this article before the release of API version 2026-02-01 to avoid disruption.
26
26
27
-
Azure Key Vault is implementing an important security enhancement in API version 2026-02-01, releasing in February 2026. To help protect your key vaults and reduce security risks, **the new Key Vault API version establishes Azure RBAC as the default access control model**, consistent with the Azure portal experience.
27
+
Azure Key Vault API version 2026-02-01, releasing in February 2026, changes the default access control model for new vaults to Azure RBAC, consistent with the Azure portal experience. Both Azure RBAC and access policies remain fully supported options.
28
28
29
29
The ramifications of this change are as follows:
30
30
@@ -175,18 +175,18 @@ If your key vaults already use Azure RBAC as their access control model, update
175
175
If your key vaults use access policies (`enableRbacAuthorization` = `false`), decide if you want to migrate to role-based access (recommended) or continue using access policies. For more information on access control models, see [Use Azure RBAC for managing access to Key Vault](rbac-guide.md) and [Azure Key Vault best practices](secure-key-vault.md).
176
176
177
177
**Choose your path:**
178
-
-**Recommended**: Go to [Step 4: Migrate to Azure RBAC](#step-4-migrate-to-azure-rbac-recommended)
179
-
-**Legacy**: Go to [Step 5: Continue using access policies](#step-5-continue-using-access-policies)
178
+
-**Azure RBAC (recommended)**: Go to [Step 4: Migrate to Azure RBAC](#step-4-migrate-to-azure-rbac-recommended)
179
+
-**Access policies (legacy)**: Go to [Step 5: Use access policies for new vaults](#step-5-use-access-policies-for-new-vaults)
180
180
181
181
## Step 4: Migrate to Azure RBAC (recommended)
182
182
183
183
Use this opportunity to increase your security posture by migrating from vault access policy to Azure RBAC for managing access. For detailed migration guidance, see [Migrate from vault access policy to an Azure role-based access control permission model](rbac-migration.md).
184
184
185
185
Update all Key Vault ARM, BICEP, Terraform templates, and REST API calls to use API version 2026-02-01 or later.
186
186
187
-
## Step 5: Continue using access policies
187
+
## Step 5: Use access policies for new vaults
188
188
189
-
To continue using access policies, follow the instructions in this section.
189
+
Access policies remain a fully supported access control model. To continue using access policies for new vaults, follow the instructions in this section.
190
190
191
191
Choose one of the following methods based on your scenario:
0 commit comments