Skip to content

Commit 1a93a04

Browse files
msmbaldwinCopilot
andcommitted
Improve readability of whats-new.md for Acrolinx compliance
Fix sentence fragments, break up long sentences, remove non-breaking space, add missing periods, replace 'please visit' and 'leveraging', fix 'here' link text, and improve clarity throughout the article. Co-authored-by: Copilot <[email protected]>
1 parent 73feee1 commit 1a93a04

1 file changed

Lines changed: 22 additions & 22 deletions

File tree

articles/key-vault/general/whats-new.md

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -29,9 +29,9 @@ Azure Key Vault is deprecating older preview control plane API versions in accor
2929

3030
### Supported control plane API versions
3131

32-
The following Azure Key Vault control plane API versions are currently supported.
32+
Use the latest stable version for production workloads. Preview versions are for early testing only and aren't covered by Azure support SLAs. Each link points to the API specification in the `azure-rest-api-specs` repository.
3333

34-
#### Stable
34+
#### Stable API versions
3535

3636
- [2026-02-01](https://github.com/Azure/azure-rest-api-specs/tree/main/specification/keyvault/resource-manager/Microsoft.KeyVault/KeyVault/stable/2026-02-01) (recommended)
3737
- [2025-05-01](https://github.com/Azure/azure-rest-api-specs/tree/main/specification/keyvault/resource-manager/Microsoft.KeyVault/KeyVault/stable/2025-05-01)
@@ -46,7 +46,7 @@ The following Azure Key Vault control plane API versions are currently supported
4646
- [2016-10-01](https://github.com/Azure/azure-rest-api-specs/tree/main/specification/keyvault/resource-manager/Microsoft.KeyVault/KeyVault/stable/2016-10-01)
4747
- [2015-06-01](https://github.com/Azure/azure-rest-api-specs/tree/main/specification/keyvault/resource-manager/Microsoft.KeyVault/KeyVault/stable/2015-06-01)
4848

49-
#### Preview
49+
#### Preview API versions
5050

5151
- [2024-12-01-preview](https://github.com/Azure/azure-rest-api-specs/tree/main/specification/keyvault/resource-manager/Microsoft.KeyVault/KeyVault/preview/2024-12-01-preview) (recommended)
5252
- [2024-04-01-preview](https://github.com/Azure/azure-rest-api-specs/tree/main/specification/keyvault/resource-manager/Microsoft.KeyVault/KeyVault/preview/2024-04-01-preview)
@@ -103,60 +103,60 @@ For more information, see [Apps, API keys, and Azure Key Vault secrets](apps-api
103103

104104
## July 2023
105105

106-
Built-in policy to govern the key rotation configuration in Azure Key Vault. With this policy, you can audit existing keys in key vaults to ensure that all keys are configured for rotation and comply with your organization's standards.
106+
A built-in policy now governs key rotation configuration in Azure Key Vault. With this policy, you can audit existing keys in key vaults to ensure that all keys are configured for rotation and comply with your organization's standards.
107107

108-
For more information, see [Configure key rotation governance](../keys/how-to-configure-key-rotation.md#configure-key-rotation-policy-governance)
108+
For more information, see [Configure key rotation governance](../keys/how-to-configure-key-rotation.md#configure-key-rotation-policy-governance).
109109

110110
## June 2023
111111

112-
Key Vault enforces TLS 1.2 or higher for enhanced security. If you're still using an older TLS version, see [Enable support for TLS 1.2 in your environment](/troubleshoot/entra/entra-id/ad-dmn-services/enable-support-tls-environment#why-this-change-is-being-made) to update your clients and ensure uninterrupted access to Key Vault services. You can monitor TLS version used by clients by monitoring Key Vault logs with sample Kusto query [here](monitor-key-vault.md#sample-kusto-queries).
112+
Key Vault enforces TLS 1.2 or higher for enhanced security. If you're still using an older TLS version, see [Enable support for TLS 1.2 in your environment](/troubleshoot/entra/entra-id/ad-dmn-services/enable-support-tls-environment#why-this-change-is-being-made) to update your clients and ensure uninterrupted access to Key Vault services. To monitor the TLS version that clients use, see the [sample Kusto queries](monitor-key-vault.md#sample-kusto-queries) in the Key Vault monitoring guide.
113113

114114
## May 2023
115115

116-
Azure RBAC is now the recommended authorization system for the Azure Key Vault data plane. Azure RBAC is built on Azure Resource Manager and provides fine-grained access management of Azure resources. With Azure RBAC you control access to resources by creating role assignments, which consist of three elements: a security principal, a role definition (predefined set of permissions), and a scope (group of resources or individual resource).
116+
Azure RBAC is now the recommended authorization system for the Azure Key Vault data plane. Azure RBAC is built on Azure Resource Manager and provides fine-grained access management of Azure resources. With Azure RBAC, you control access to resources by creating role assignments. Each role assignment consists of three elements: a security principal, a role definition (predefined set of permissions), and a scope (group of resources or individual resource).
117117

118-
For more information, please visit [Azure role-based access control (Azure RBAC) vs. access policies | Microsoft Learn](rbac-access-policy.md)
118+
For more information, see [Azure role-based access control (Azure RBAC) vs. access policies](rbac-access-policy.md).
119119

120120
## February 2023
121121

122-
Built-in policy to govern the migration to Azure role-based access control (Azure RBAC) is now in preview. With the built-in policy you can audit existing key vaults and enforce all new key vaults to use the Azure RBAC permission model. See [Azure RBAC migration governance](../general/rbac-migration.md#migration-governance-with-azure-policy) to learn how to enforce the new built-in policy.
122+
A built-in policy to govern the migration to Azure role-based access control (Azure RBAC) is now in preview. With the built-in policy, you can audit existing key vaults and enforce all new key vaults to use the Azure RBAC permission model. To learn how to enforce the new built-in policy, see [Azure RBAC migration governance](../general/rbac-migration.md#migration-governance-with-azure-policy).
123123

124124
## April 2022
125125

126126
Automated encryption key rotation in Key Vault is now generally available.
127127

128-
For more information, see [Configure key auto-rotation in Key Vault](../keys/how-to-configure-key-rotation.md)
128+
For more information, see [Configure key auto-rotation in Key Vault](../keys/how-to-configure-key-rotation.md).
129129

130130
## January 2022
131131

132-
Azure Key Vault service throughput limits have been increased to serve double its previous quota for each vault to help ensure high performance for applications. That is, for secret GET and RSA 2,048-bit software keys, you'll receive 4,000 GET transactions per 10 seconds versus 2,000 per 10 seconds previously. The service quotas are specific to operation type and the entire list can be accessed in [Azure Key Vault Service Limits](./service-limits.md).
132+
Azure Key Vault service throughput limits doubled for each vault to help ensure high performance for applications. For example, for secret GET and RSA 2,048-bit software keys, you now receive 4,000 GET transactions per 10 seconds instead of 2,000. The service quotas are specific to operation type. For the full list, see [Azure Key Vault service limits](./service-limits.md).
133133

134-
For Azure update announcement, see [General availability: Azure Key Vault increased service limits for all its customers](https://azure.microsoft.com/updates/azurekeyvaultincreasedservicelimits/).
134+
For the Azure update announcement, see [General availability: Azure Key Vault increased service limits for all its customers](https://azure.microsoft.com/updates/azurekeyvaultincreasedservicelimits/).
135135

136136

137137
## December 2021
138138

139-
Automated encryption key rotation in Key Vault is now in preview. You can set a rotation policy on a key to schedule automated rotation and configure expiry notifications through Event Grid integration.
139+
Automated encryption key rotation in Key Vault is now in preview. You can set a rotation policy on a key to schedule automated rotation and configure expiry notifications through Event Grid integration.
140140

141-
For more information, see [Configure key auto-rotation in Key Vault](../keys/how-to-configure-key-rotation.md)
141+
For more information, see [Configure key auto-rotation in Key Vault](../keys/how-to-configure-key-rotation.md).
142142

143143
## October 2021
144144

145-
Integration of Azure Key Vault with Azure Policy has reached general availability and is now ready for production use. This capability is a step towards our commitment to simplifying secure secrets management in Azure, while also enhancing policy enforcements that you can define on Key Vault, keys, secrets and certificates. Azure Policy allows you to place guardrails on Key Vault and its objects to ensure they're compliant with your organizations security recommendations and compliance regulations. It allows you to perform real time policy-based enforcement and on-demand compliance assessment of existing secrets in your Azure environment. The results of audits performed by policy will be available to you in a compliance dashboard where you'll be able to see a drill-down of which resources and components are compliant and which aren't. Azure policy for Key Vault will provide you with a full suite of built-in policies offering governance of your keys, secrets, and certificates.
145+
Integration of Azure Key Vault with Azure Policy has reached general availability. Azure Policy lets you place guardrails on Key Vault and its objects to ensure they comply with your organization's security recommendations and compliance regulations. You can perform real-time policy-based enforcement and on-demand compliance assessment of existing secrets in your Azure environment. A compliance dashboard shows which resources and components are compliant.
146146

147-
You can learn more about how to [Integrate Azure Key Vault with Azure Policy](./azure-policy.md?tabs=certificates) and assign a new policy. See the [Azure Key Vault policy announcement](https://azure.microsoft.com/updates/gaazurepolicyforkeyvault) for more details.
147+
Azure Policy for Key Vault provides a full suite of built-in policies for governance of your keys, secrets, and certificates. To learn more, see [Integrate Azure Key Vault with Azure Policy](./azure-policy.md?tabs=certificates). For the announcement, see [Azure Key Vault policy general availability](https://azure.microsoft.com/updates/gaazurepolicyforkeyvault).
148148

149149
## June 2021
150150

151-
Azure Key Vault Managed HSM is generally available. Managed HSM offers a fully managed, highly available, single-tenant, high-throughput, standards-compliant cloud service to safeguard cryptographic keys for your cloud applications, using FIPS 140-2 Level 3 validated HSMs.
151+
Azure Key Vault Managed HSM is generally available. Managed HSM offers a fully managed, highly available, single-tenant cloud service to safeguard cryptographic keys for your cloud applications using FIPS 140-2 Level 3 validated HSMs.
152152

153-
For more information, see [Azure Key Vault Managed HSM Overview](../managed-hsm/overview.md)
153+
For more information, see [Azure Key Vault Managed HSM overview](../managed-hsm/overview.md).
154154

155155
## February 2021
156156

157-
Azure role-based access control (RBAC) for Azure Key Vault data plane authorization is now generally available. With this capability, you can now manage RBAC for Key Vault keys, certificates, and secrets with roles assignment scope available from management group to individual key, certificate, and secret.
157+
Azure role-based access control (RBAC) for Azure Key Vault data plane authorization is now generally available. You can now manage RBAC for Key Vault keys, certificates, and secrets with role assignment scopes from management group to individual key, certificate, and secret.
158158

159-
For more information, see [Provide access to Key Vault keys, certificates, and secrets with an Azure role-based access control](rbac-guide.md)
159+
For more information, see [Provide access to Key Vault keys, certificates, and secrets with Azure role-based access control](rbac-guide.md).
160160

161161
## October 2020
162162

@@ -197,7 +197,7 @@ Private endpoints now available in preview. Azure Private Link Service enables y
197197

198198
New features and integrations released this year:
199199

200-
- Integration with Azure Functions. For an example scenario leveraging [Azure Functions](/azure/azure-functions/) for key vault operations, see [Automate the rotation of a secret](../secrets/tutorial-rotation.md).
200+
- Integration with Azure Functions. For an example scenario that uses [Azure Functions](/azure/azure-functions/) for key vault operations, see [Automate the rotation of a secret](../secrets/tutorial-rotation.md).
201201
- [Integration with Azure Databricks](./integrate-databricks-blob-storage.md). With this, Azure Databricks now supports two types of secret scopes: Azure Key Vault-backed and Databricks-backed. For more information, see [Create an Azure Key Vault-backed secret scope](/azure/databricks/security/secrets/secret-scopes#--create-an-azure-key-vault-backed-secret-scope)
202202
- [Virtual network service endpoints for Azure Key Vault](overview-vnet-service-endpoints.md).
203203

@@ -232,7 +232,7 @@ Second preview version (version 2015-02-01-preview) was announced April 20, 2015
232232
- Create a secret - added tags as optional information.
233233
- Update a key - added tags as optional information.
234234
- Update a secret - added tags as optional information.
235-
- Changed max size for secrets from 10 K to 25 K Bytes. See, [About keys, secrets, and certificates](about-keys-secrets-certificates.md).
235+
- Changed max size for secrets from 10 K to 25 K Bytes. See [About keys, secrets, and certificates](about-keys-secrets-certificates.md).
236236

237237
## 2014
238238

0 commit comments

Comments
 (0)