Skip to content

Commit 18f056c

Browse files
Merge pull request #2634 from msmbaldwin/akv-whats-new
akv-whats-new
2 parents 2c0a61a + db522c9 commit 18f056c

7 files changed

Lines changed: 74 additions & 12 deletions

File tree

articles/key-vault/general/access-control-default.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: mbaldwin
66
ms.service: azure-key-vault
77
ms.subservice: general
88
ms.topic: how-to
9-
ms.date: 02/27/2026
9+
ms.date: 03/24/2026
1010
ms.custom: devx-track-azurepowershell, devx-track-azurecli, sfi-image-nochange
1111

1212
#customer intent: As an Azure Key Vault administrator, I want to migrate from access policies to Azure RBAC so that I can improve security and simplify access management.
@@ -15,15 +15,19 @@ ms.custom: devx-track-azurepowershell, devx-track-azurecli, sfi-image-nochange
1515

1616
# Prepare for Key Vault API version 2026-02-01 and later: Azure RBAC as default access control
1717

18-
Azure Key Vault API version 2026-02-01 and later change the default access control model for new vaults to Azure RBAC, consistent with the Azure portal experience. Both Azure RBAC and access policies remain fully supported.
18+
Azure Key Vault API version 2026-02-01 and later change the default access control model for new vaults to Azure RBAC, consistent with the Azure portal experience. Both Azure RBAC and access policies remain fully supported. API version 2026-02-01 is available in public Azure regions, Mooncake, and Fairfax.
1919

2020
- **New key vault creation behavior**: When you create a new vault with API version `2026-02-01` or later, the default access control model is Azure RBAC (`enableRbacAuthorization = true`). This default applies only to **create** operations. To use access policies for new vaults, set `enableRbacAuthorization` to `false` at creation time.
2121
- **Existing key vault behavior**: Existing vaults keep their current access control model unless you explicitly change `enableRbacAuthorization`. Using API version `2026-02-01` or later to update a vault does not automatically change access control. Vaults where `enableRbacAuthorization` is `null` (from older API versions) continue using access policies.
2222

2323
> [!IMPORTANT]
2424
> All Key Vault Control Plane API versions before 2026-02-01 retire on February 27, 2027. Adopt API version 2026-02-01 or later before this date. Data Plane APIs are not affected.
25+
>
26+
> Preview API versions (except 2026-04-01-preview) are being deprecated with a 90-day notice period.
2527
>
2628
> Note that Azure Cloud Shell always uses the latest API version. If you have scripts that run in Cloud Shell, ensure they are compatible with API version 2026-02-01 or later.
29+
>
30+
> Control plane management SDKs supporting API version 2026-02-01 are available for all languages. For package details, see [What's new for Azure Key Vault](whats-new.md#control-plane-sdk-releases).
2731
2832
We encourage you to migrate key vaults that currently use access policies (legacy) to Azure RBAC for improved security. For more information on why Azure RBAC is recommended, see [Azure role-based access control (Azure RBAC) vs. access policies](rbac-access-policy.md).
2933

articles/key-vault/general/client-libraries.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: msmbaldwin
77
ms.service: azure-key-vault
88
ms.subservice: general
99
ms.topic: tutorial
10-
ms.date: 01/08/2026
10+
ms.date: 03/24/2026
1111
ms.author: mbaldwin
1212

1313

@@ -20,7 +20,7 @@ The Azure Key Vault client libraries provide programmatic access to Key Vault fu
2020

2121
## Client libraries per language and object
2222

23-
Each SDK has separate client libraries for secrets, keys, certificates, and management (control plane).
23+
Each SDK has separate client libraries for secrets, keys, certificates, and management (control plane). For the latest control plane SDK release information supporting API version 2026-02-01, see [What's new for Azure Key Vault](whats-new.md#control-plane-sdk-releases).
2424

2525
| Language | Secrets | Keys | Certificates | Key Vault (Control plane) |
2626
|--|--|--|--|--|
@@ -29,6 +29,7 @@ Each SDK has separate client libraries for secrets, keys, certificates, and mana
2929
| **Java** | - [API Reference](/java/api/overview/azure/security-keyvault-secrets-readme)<br>- [Source](https://github.com/Azure/azure-sdk-for-java/tree/main/sdk/keyvault/azure-security-keyvault-secrets)<br>- [Quickstart](../secrets/quick-create-java.md) | - [API Reference](/java/api/overview/azure/security-keyvault-keys-readme)<br>- [Source](https://github.com/Azure/azure-sdk-for-java/tree/main/sdk/keyvault/azure-security-keyvault-keys)<br>- [Quickstart](../keys/quick-create-java.md) | - [API Reference](/java/api/overview/azure/security-keyvault-certificates-readme)<br>- [Source](https://github.com/Azure/azure-sdk-for-java/tree/main/sdk/keyvault/azure-security-keyvault-certificates)<br>- [Quickstart](../certificates/quick-create-java.md) | - [API Reference](/java/api/overview/azure/resourcemanager-keyvault-readme)<br>- [Source](https://github.com/Azure/azure-sdk-for-java/tree/main/sdk/keyvault/azure-resourcemanager-keyvault) |
3030
| **Spring** | - [Reference](/azure/developer/java/spring-framework/spring-cloud-azure?tabs=maven#secret-management)<br>- [Source](https://github.com/Azure/azure-sdk-for-java/tree/main/sdk/spring)<br>- [Quickstart](/azure/developer/java/spring-framework/configure-spring-boot-starter-java-app-with-azure-key-vault) | | - [Reference](/azure/developer/java/spring-framework/spring-cloud-azure-appendix#azure-key-vault-certificates-properties)<br>- [Source](https://github.com/Azure/azure-sdk-for-java/tree/main/sdk/spring)<br>- [Quickstart](/azure/developer/java/spring-framework/configure-spring-boot-starter-java-app-with-azure-key-vault-certificates) | |
3131
| **Node.js** | - [API Reference](/javascript/api/@azure/keyvault-secrets/)<br>- [npm](https://www.npmjs.com/package/@azure/keyvault-secrets)<br>- [Source](https://github.com/Azure/azure-sdk-for-js/tree/main/sdk/keyvault/keyvault-secrets)<br>- [Quickstart](../secrets/quick-create-node.md) | - [API Reference](/javascript/api/@azure/keyvault-keys/)<br>- [npm](https://www.npmjs.com/package/@azure/keyvault-keys)<br>- [Source](https://github.com/Azure/azure-sdk-for-js/tree/main/sdk/keyvault/keyvault-keys)<br>- [Quickstart](../keys/quick-create-node.md) | - [API Reference](/javascript/api/@azure/keyvault-certificates/)<br>- [npm](https://www.npmjs.com/package/@azure/keyvault-certificates)<br>- [Source](https://github.com/Azure/azure-sdk-for-js/tree/main/sdk/keyvault/keyvault-certificates)<br>- [Quickstart](../certificates/quick-create-node.md) | - [API Reference](/javascript/api/@azure/arm-keyvault/)<br>- [npm](https://www.npmjs.com/package/@azure/arm-keyvault)<br>- [Source](https://github.com/Azure/azure-sdk-for-js/tree/main/sdk/keyvault/arm-keyvault) |
32+
| **Go** | - [API Reference](https://pkg.go.dev/github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/azsecrets)<br>- [Source](https://github.com/Azure/azure-sdk-for-go/tree/main/sdk/security/keyvault/azsecrets) | - [API Reference](https://pkg.go.dev/github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/azkeys)<br>- [Source](https://github.com/Azure/azure-sdk-for-go/tree/main/sdk/security/keyvault/azkeys) | - [API Reference](https://pkg.go.dev/github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/azcertificates)<br>- [Source](https://github.com/Azure/azure-sdk-for-go/tree/main/sdk/security/keyvault/azcertificates) | - [API Reference](https://pkg.go.dev/github.com/Azure/azure-sdk-for-go/sdk/resourcemanager/keyvault/armkeyvault)<br>- [Source](https://github.com/Azure/azure-sdk-for-go/tree/main/sdk/resourcemanager/keyvault/armkeyvault) |
3233

3334
## Next steps
3435
- See the [Azure Key Vault developer's guide](developers-guide.md).

articles/key-vault/general/private-link-service.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Integrate Key Vault with Azure Private Link
33
description: Learn how to integrate Azure Key Vault with Azure Private Link Service
44
author: msmbaldwin
55
ms.author: mbaldwin
6-
ms.date: 01/30/2026
6+
ms.date: 03/24/2026
77
ms.service: azure-key-vault
88
ms.subservice: general
99
ms.topic: how-to
@@ -31,6 +31,8 @@ Your private endpoint and virtual network must be in the same region. When you s
3131

3232
Your private endpoint uses a private IP address in your virtual network.
3333

34+
Azure Key Vault enforces limits on the number of private endpoints per vault. For information on these limits, see [Azure Key Vault service limits](service-limits.md).
35+
3436
# [Azure portal](#tab/portal)
3537

3638
## Establish a private link connection to Key Vault using the Azure portal

articles/key-vault/general/rbac-access-policy.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: msmbaldwin
66
ms.service: azure-key-vault
77
ms.subservice: general
88
ms.topic: how-to
9-
ms.date: 01/30/2026
9+
ms.date: 03/24/2026
1010
ms.author: mbaldwin
1111

1212
---
@@ -22,7 +22,9 @@ The access policy model is a legacy authorization system, native to Key Vault, w
2222

2323
## Data plane access control recommendation
2424

25-
Azure RBAC is the recommended authorization system for the Azure Key Vault data plane. It offers several advantages over Key Vault access policies:
25+
Azure RBAC is the recommended authorization system for the Azure Key Vault data plane. Starting with API version 2026-02-01, Azure RBAC is also the **default access control model for new key vaults**, consistent with the Azure portal experience. For details on this change and guidance for preparing your deployments, see [Prepare for Key Vault API version 2026-02-01 and later](access-control-default.md).
26+
27+
Azure RBAC offers several advantages over Key Vault access policies:
2628
- Azure RBAC provides a unified access control model for Azure resources &mdash; the same APIs are used across all Azure services.
2729
- Access management is centralized, providing administrators with a consistent view of access granted to Azure resources.
2830
- The right to grant access to keys, secrets, and certificates is better controlled, requiring Owner or User Access Administrator role membership.

articles/key-vault/general/rbac-guide.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: azure-key-vault
77
ms.subservice: general
88
ms.custom: devx-track-azurecli, devx-track-azurepowershell, sfi-image-nochange, copilot-scenario-highlight
99
ms.topic: how-to
10-
ms.date: 01/30/2026
10+
ms.date: 03/24/2026
1111
ms.author: mbaldwin
1212
---
1313

@@ -16,7 +16,7 @@ ms.author: mbaldwin
1616
> [!NOTE]
1717
> Key Vault resource provider supports two resource types: **vaults** and **managed HSMs**. Access control described in this article only applies to **vaults**. To learn more about access control for managed HSM, see [Managed HSM access control](../managed-hsm/access-control.md).
1818
19-
Azure role-based access control (Azure RBAC) is an authorization system built on [Azure Resource Manager](/azure/azure-resource-manager/management/overview) that provides centralized access management of Azure resources.
19+
Azure role-based access control (Azure RBAC) is an authorization system built on [Azure Resource Manager](/azure/azure-resource-manager/management/overview) that provides centralized access management of Azure resources. Starting with API version 2026-02-01, Azure RBAC is the default access control model for newly created key vaults. For details on this change and how to prepare, see [Prepare for Key Vault API version 2026-02-01 and later](access-control-default.md).
2020

2121
Azure RBAC allows users to manage keys, secrets, and certificates permissions, and provides one place to manage all permissions across all key vaults.
2222

articles/key-vault/general/rbac-migration.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,13 +6,15 @@ author: msmbaldwin
66
ms.service: azure-key-vault
77
ms.subservice: general
88
ms.topic: how-to
9-
ms.date: 01/30/2026
9+
ms.date: 03/24/2026
1010
ms.author: mbaldwin
1111
ms.custom: sfi-image-nochange
1212
---
1313
# Migrate to Azure RBAC from access policies
1414

15-
Azure Key Vault offers two access control models: Azure role-based access control (Azure RBAC), and an access policy model. Azure RBAC is the default and recommended access control model for Azure Key Vault. For a comparison of the two methods of authorization, see [Azure role-based access control (Azure RBAC) vs. access policies](rbac-access-policy.md).
15+
Azure Key Vault offers two access control models: Azure role-based access control (Azure RBAC), and an access policy model. Azure RBAC is the default and recommended access control model for Azure Key Vault. Starting with API version 2026-02-01, Azure RBAC is the default access control model for new vaults. For a comparison of the two methods of authorization, see [Azure role-based access control (Azure RBAC) vs. access policies](rbac-access-policy.md).
16+
17+
For information on preparing your existing deployments for this change, see [Prepare for Key Vault API version 2026-02-01 and later](access-control-default.md).
1618

1719
This article provides the information necessary to migrate a key vault from an access policy model to an Azure RBAC model.
1820

articles/key-vault/general/whats-new.md

Lines changed: 52 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: msmbaldwin
66
ms.service: azure-key-vault
77
ms.subservice: general
88
ms.topic: reference
9-
ms.date: 01/30/2026
9+
ms.date: 03/24/2026
1010
ms.author: mbaldwin
1111

1212
#Customer intent: As an Azure Key Vault administrator, I want to react to soft-delete being turned on for all key vaults.
@@ -17,6 +17,57 @@ ms.author: mbaldwin
1717

1818
Here's what's new with Azure Key Vault. New features and improvements are also announced on the [Azure updates Key Vault channel](https://azure.microsoft.com/updates/?category=security&query=Key%20vault).
1919

20+
## March 2026
21+
22+
### New control plane API versions
23+
24+
New Azure Key Vault control plane API versions (2026-02-01 and 2026-03-01-preview) are now available across public Azure regions, with availability extended to Mooncake and Fairfax clouds.
25+
26+
### Preview API version deprecation
27+
28+
Azure Key Vault is deprecating older preview control plane API versions in accordance with Azure guidelines. All preview API versions except 2026-04-01-preview will be deprecated with a 90-day notice period. Customers using preview API versions should plan to migrate to the latest stable API version (2026-02-01) or the upcoming 2026-04-01-preview version.
29+
30+
### Control plane SDK releases
31+
32+
All five Azure Key Vault control plane management SDKs are now released:
33+
34+
| Language | Package | Version |
35+
|----------|---------|---------|
36+
| .NET | [Azure.ResourceManager.KeyVault](https://www.nuget.org/packages/Azure.ResourceManager.KeyVault) | 1.4.0 |
37+
| JavaScript | [@azure/arm-keyvault](https://www.npmjs.com/package/@azure/arm-keyvault) | Latest |
38+
| Go | [armkeyvault](https://pkg.go.dev/github.com/Azure/azure-sdk-for-go/sdk/resourcemanager/keyvault/armkeyvault/v2) | v2 |
39+
| Python | [azure-mgmt-keyvault](https://pypi.org/project/azure-mgmt-keyvault/) | Latest |
40+
| Java | [azure-resourcemanager-keyvault](https://central.sonatype.com/artifact/com.azure.resourcemanager/azure-resourcemanager-keyvault) | Latest |
41+
42+
### Azure RBAC is the default access control model for new vaults
43+
44+
Azure Key Vault API version 2026-02-01 introduces Azure RBAC as the default access control model for newly created key vaults when using this API version. Existing vaults continue using their current access model unless explicitly updated. Both Azure RBAC and access policies remain fully supported.
45+
46+
For more information, see [Prepare for Key Vault API version 2026-02-01 and later](access-control-default.md).
47+
48+
### Private endpoint limit enforcement
49+
50+
Azure Key Vault is enforcing limits on the number of private endpoints per vault. Customers exceeding these limits may need to reduce usage or request an exception through Azure support.
51+
52+
For more information on private endpoint limits, see [Azure Key Vault service limits](service-limits.md).
53+
54+
## November 2025
55+
56+
### Security best practices articles
57+
58+
New security best practices documentation is available for Azure Key Vault workloads:
59+
60+
- [Secure your Azure Key Vault](secure-key-vault.md): Comprehensive security guidance for vault architecture, network security, identity and access management, and monitoring.
61+
- [Secure your Azure Key Vault keys](../keys/secure-keys.md): Key-specific security recommendations for key types, protection levels, rotation, and operations.
62+
- [Secure your Azure Key Vault secrets](../secrets/secure-secrets.md): Secrets-specific best practices for storage, rotation, and access patterns.
63+
- [Secure your Azure Key Vault certificates](../certificates/secure-certificates.md): Certificate-specific guidance for lifecycle management, CA integration, and renewal.
64+
65+
### Apps, API keys, and Key Vault secrets guidance
66+
67+
New guidance is available for configuring applications to securely interact with API keys stored in Azure Key Vault, including best practices for access control, monitoring, and network restrictions.
68+
69+
For more information, see [Apps, API keys, and Azure Key Vault secrets](apps-api-keys-secrets.md).
70+
2071
## July 2023
2172

2273
Built-in policy to govern the key rotation configuration in Azure Key Vault. With this policy, you can audit existing keys in key vaults to ensure that all keys are configured for rotation and comply with your organization's standards.

0 commit comments

Comments
 (0)