Skip to content

Commit 195174b

Browse files
authored
Merge pull request #2714 from msmbaldwin/akv-keys-audit
Key Vault keys docset audit: retire nCipher article, fix FIPS levels, update SDKs, clean up stale content
2 parents f6e20e9 + 9062d6e commit 195174b

14 files changed

Lines changed: 60 additions & 794 deletions

.openpublishing.redirection.key-vault.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -599,6 +599,11 @@
599599
"source_path_from_root": "/articles/key-vault/secrets/about-managed-storage-account-keys.md",
600600
"redirect_url": "/azure/storage/common/authorize-data-access",
601601
"redirect_document_id": false
602+
},
603+
{
604+
"source_path_from_root": "/articles/key-vault/keys/hsm-protected-keys-ncipher.md",
605+
"redirect_url": "/azure/key-vault/keys/hsm-protected-keys-byok",
606+
"redirect_document_id": false
602607
}
603608
]
604609
}

articles/key-vault/keys/about-keys-details.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: msmbaldwin
77
ms.service: azure-key-vault
88
ms.subservice: keys
99
ms.topic: concept-article
10-
ms.date: 04/02/2026
10+
ms.date: 04/09/2026
1111
ms.author: mbaldwin
1212
---
1313

@@ -167,7 +167,7 @@ You can specify more application-specific metadata in the form of tags. Key Vaul
167167

168168
Key Vault provides access control for keys at the Key Vault level, which acts as the container for keys. You can control access to keys by using either Key Vault [Azure role-based access control](../general/rbac-guide.md) (recommended) or the legacy [vault access policy](../general/assign-access-policy.md) permission model. Azure RBAC is the default and recommended authorization model. It has three predefined roles to manage keys: **Key Vault Crypto Officer**, **Key Vault Crypto User**, and **Key Vault Service Encryption User**. You can scope these roles to the subscription, resource group, or vault level. For more information, see [Azure RBAC vs. access policies](../general/rbac-access-policy.md).
169169

170-
Vault access policy permission model permissions:
170+
Vault access policy permission model permissions (legacy):
171171

172172
- Permissions for key management operations
173173
- *get*: Read the public part of a key, plus its attributes

articles/key-vault/keys/byok-specification.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: msmbaldwin
77
ms.service: azure-key-vault
88
ms.subservice: keys
99
ms.topic: feature-guide
10-
ms.date: 03/26/2026
10+
ms.date: 04/09/2026
1111
ms.author: mbaldwin
1212
ms.custom: devx-track-azurecli
1313
---
@@ -70,7 +70,7 @@ az keyvault key create --kty RSA-HSM --size 4096 --name KEKforBYOK --ops import
7070
```
7171

7272
> [!NOTE]
73-
> Services support different KEK lengths. Azure SQL, for instance, only supports key lengths of [2048 or 3072 bytes](/azure/azure-sql/database/transparent-data-encryption-byok-overview#requirements-for-configuring-customer-managed-tde). Consult the documentation for your service for specifics.
73+
> Services support different KEK lengths. Azure SQL, for instance, only supports key lengths of [2048-bit or 3072-bit](/azure/azure-sql/database/transparent-data-encryption-byok-overview#requirements-for-configuring-customer-managed-tde). Consult the documentation for your service for specifics.
7474
7575
### Retrieve the public key of the KEK
7676

@@ -140,7 +140,7 @@ az keyvault key import --vault-name <vault-name> --name <key-name> --kty EC-HSM
140140
When you run this command, it sends a REST API request as follows:
141141

142142
```
143-
PUT https://<vault-name>.vault.azure.net/keys/<key-name>?api-version=7.0
143+
PUT https://<vault-name>.vault.azure.net/keys/<key-name>?api-version=7.6
144144
```
145145

146146
Request body when importing an RSA key:

articles/key-vault/keys/how-to-configure-key-rotation.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.custom: devx-track-arm-template, sfi-image-nochange, copilot-scenario-highlig
88
ms.service: azure-key-vault
99
ms.subservice: keys
1010
ms.topic: how-to
11-
ms.date: 04/02/2026
11+
ms.date: 04/09/2026
1212
ms.author: mbaldwin
1313
---
1414

@@ -205,7 +205,7 @@ You can configure the key rotation policy by using ARM templates.
205205
"resources": [
206206
{
207207
"type": "Microsoft.KeyVault/vaults/keys",
208-
"apiVersion": "2021-06-01-preview",
208+
"apiVersion": "2024-11-01",
209209
"name": "[concat(parameters('vaultName'), '/', parameters('keyName'))]",
210210
"location": "[resourceGroup().location]",
211211
"properties": {

articles/key-vault/keys/hsm-protected-keys-byok.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,12 +8,14 @@ ms.custom: devx-track-azurepowershell, devx-track-azurecli, copilot-scenario-hig
88
ms.service: azure-key-vault
99
ms.subservice: keys
1010
ms.topic: tutorial
11-
ms.date: 01/30/2026
11+
ms.date: 04/09/2026
1212
ms.author: mbaldwin
1313
---
1414

1515
# Import HSM-protected keys to Key Vault (BYOK)
1616

17+
[!INCLUDE [updated-for-az](~/reusable-content/ce-skilling/azure/includes/updated-for-az.md)]
18+
1719
For added assurance when you use Azure Key Vault, you can import or generate a key in a hardware security module (HSM); the key never leaves the HSM boundary. This scenario is often referred to as *bring your own key (BYOK)*. Key Vault uses [FIPS 140 validated HSMs](/azure/key-vault/keys/about-keys#compliance) to protect your keys.
1820

1921
> [!IMPORTANT]
@@ -64,7 +66,7 @@ The following table lists prerequisites for using BYOK in Azure Key Vault:
6466
|Securosys SA|Manufacturer,<br/>HSM as a service|Primus HSM family, Securosys Clouds HSM|[Primus BYOK tool and documentation](https://www.securosys.com/primus-azure-byok)|
6567
|StorMagic|ISV (Enterprise Key Management System)|Multiple HSM brands and models including<ul><li>Utimaco</li><li>Thales</li><li>nCipher</li></ul>|See [StorMagic site for details](https://stormagic.com/doc/svkms/Content/Integrations/Azure_KeyVault_BYOK.htm). [SvKMS and Azure Key Vault BYOK](https://stormagic.com/doc/svkms/Content/Integrations/Azure_KeyVault_BYOK.htm)|
6668
|Thales|Manufacturer|<ul><li>Luna HSM 7 family with firmware version 7.3 or newer</li></ul>| [Luna BYOK tool and documentation](https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=3892db6ddb8fc45005c9143b0b961987&sysparm_article=KB0021016)|
67-
|Utimaco|Manufacturer,<br/>HSM as a service|u.trust Anchor, CryptoServer| Utimaco BYOK tool and Integration guide |
69+
|Utimaco|Manufacturer,<br/>HSM as a service|u.trust Anchor, CryptoServer|[Utimaco BYOK tool and integration guide](https://utimaco.com/integration-guides/microsoft-azure-key-vault-byok-utimaco-securityserver)|
6870
|Yubico|Manufacturer|YubiHSM 2| [YubiHSM 2 BYOK User Guide for Azure](https://resources.yubico.com/53ZDUYE6/at/2rsrrspcftx4xkp8fn9nsgv/YubiHSM_2_BYOK_User_Guide_for_Azure.pdf?format=pdf) |
6971
||||
7072

0 commit comments

Comments
 (0)