You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Improve readability of whats-new.md for Acrolinx compliance
Fix sentence fragments, break up long sentences, remove non-breaking
space, add missing periods, replace 'please visit' and 'leveraging',
fix 'here' link text, and improve clarity throughout the article.
Co-authored-by: Copilot <[email protected]>
Copy file name to clipboardExpand all lines: articles/key-vault/general/whats-new.md
+22-22Lines changed: 22 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,9 +29,9 @@ Azure Key Vault is deprecating older preview control plane API versions in accor
29
29
30
30
### Supported control plane API versions
31
31
32
-
The following Azure Key Vault control plane API versions are currently supported.
32
+
Use the latest stable version for production workloads. Preview versions are for early testing only and aren't covered by Azure support SLAs. Each link points to the API specification in the `azure-rest-api-specs` repository.
@@ -103,60 +103,60 @@ For more information, see [Apps, API keys, and Azure Key Vault secrets](apps-api
103
103
104
104
## July 2023
105
105
106
-
Built-in policy to govern the key rotation configuration in Azure Key Vault. With this policy, you can audit existing keys in key vaults to ensure that all keys are configured for rotation and comply with your organization's standards.
106
+
A built-in policy now governs key rotation configuration in Azure Key Vault. With this policy, you can audit existing keys in key vaults to ensure that all keys are configured for rotation and comply with your organization's standards.
107
107
108
-
For more information, see [Configure key rotation governance](../keys/how-to-configure-key-rotation.md#configure-key-rotation-policy-governance)
108
+
For more information, see [Configure key rotation governance](../keys/how-to-configure-key-rotation.md#configure-key-rotation-policy-governance).
109
109
110
110
## June 2023
111
111
112
-
Key Vault enforces TLS 1.2 or higher for enhanced security. If you're still using an older TLS version, see [Enable support for TLS 1.2 in your environment](/troubleshoot/entra/entra-id/ad-dmn-services/enable-support-tls-environment#why-this-change-is-being-made) to update your clients and ensure uninterrupted access to Key Vault services. You can monitor TLS version used by clients by monitoring Key Vault logs with sample Kusto query [here](monitor-key-vault.md#sample-kusto-queries).
112
+
Key Vault enforces TLS 1.2 or higher for enhanced security. If you're still using an older TLS version, see [Enable support for TLS 1.2 in your environment](/troubleshoot/entra/entra-id/ad-dmn-services/enable-support-tls-environment#why-this-change-is-being-made) to update your clients and ensure uninterrupted access to Key Vault services. To monitor the TLS version that clients use, see the [sample Kusto queries](monitor-key-vault.md#sample-kusto-queries) in the Key Vault monitoring guide.
113
113
114
114
## May 2023
115
115
116
-
Azure RBAC is now the recommended authorization system for the Azure Key Vault data plane. Azure RBAC is built on Azure Resource Manager and provides fine-grained access management of Azure resources. With Azure RBAC you control access to resources by creating role assignments, which consist of three elements: a security principal, a role definition (predefined set of permissions), and a scope (group of resources or individual resource).
116
+
Azure RBAC is now the recommended authorization system for the Azure Key Vault data plane. Azure RBAC is built on Azure Resource Manager and provides fine-grained access management of Azure resources. With Azure RBAC, you control access to resources by creating role assignments. Each role assignment consists of three elements: a security principal, a role definition (predefined set of permissions), and a scope (group of resources or individual resource).
117
117
118
-
For more information, please visit [Azure role-based access control (Azure RBAC) vs. access policies | Microsoft Learn](rbac-access-policy.md)
118
+
For more information, see [Azure role-based access control (Azure RBAC) vs. access policies](rbac-access-policy.md).
119
119
120
120
## February 2023
121
121
122
-
Built-in policy to govern the migration to Azure role-based access control (Azure RBAC) is now in preview. With the built-in policy you can audit existing key vaults and enforce all new key vaults to use the Azure RBAC permission model. See [Azure RBAC migration governance](../general/rbac-migration.md#migration-governance-with-azure-policy) to learn how to enforce the new built-in policy.
122
+
A built-in policy to govern the migration to Azure role-based access control (Azure RBAC) is now in preview. With the built-in policy, you can audit existing key vaults and enforce all new key vaults to use the Azure RBAC permission model. To learn how to enforce the new built-in policy, see [Azure RBAC migration governance](../general/rbac-migration.md#migration-governance-with-azure-policy).
123
123
124
124
## April 2022
125
125
126
126
Automated encryption key rotation in Key Vault is now generally available.
127
127
128
-
For more information, see [Configure key auto-rotation in Key Vault](../keys/how-to-configure-key-rotation.md)
128
+
For more information, see [Configure key auto-rotation in Key Vault](../keys/how-to-configure-key-rotation.md).
129
129
130
130
## January 2022
131
131
132
-
Azure Key Vault service throughput limits have been increased to serve double its previous quota foreach vault to help ensure high performance for applications. That is, for secret GET and RSA 2,048-bit software keys, you'll receive 4,000 GET transactions per 10 seconds versus 2,000 per 10 seconds previously. The service quotas are specific to operation type and the entire list can be accessed in [Azure Key Vault Service Limits](./service-limits.md).
132
+
Azure Key Vault service throughput limits doubled foreach vault to help ensure high performance for applications. For example, for secret GET and RSA 2,048-bit software keys, you now receive 4,000 GET transactions per 10 seconds instead of 2,000. The service quotas are specific to operation type. For the full list, see [Azure Key Vault service limits](./service-limits.md).
133
133
134
-
For Azure update announcement, see [General availability: Azure Key Vault increased service limits for all its customers](https://azure.microsoft.com/updates/azurekeyvaultincreasedservicelimits/).
134
+
For the Azure update announcement, see [General availability: Azure Key Vault increased service limits for all its customers](https://azure.microsoft.com/updates/azurekeyvaultincreasedservicelimits/).
135
135
136
136
137
137
## December 2021
138
138
139
-
Automated encryption key rotation in Key Vault is now in preview. You can set a rotation policy on a key to schedule automated rotation and configure expiry notifications through Event Grid integration.
139
+
Automated encryption key rotation in Key Vault is now in preview. You can set a rotation policy on a key to schedule automated rotation and configure expiry notifications through Event Grid integration.
140
140
141
-
For more information, see [Configure key auto-rotation in Key Vault](../keys/how-to-configure-key-rotation.md)
141
+
For more information, see [Configure key auto-rotation in Key Vault](../keys/how-to-configure-key-rotation.md).
142
142
143
143
## October 2021
144
144
145
-
Integration of Azure Key Vault with Azure Policy has reached general availability and is now ready for production use. This capability is a step towards our commitment to simplifying secure secrets management in Azure, while also enhancing policy enforcements that you can define on Key Vault, keys, secrets and certificates. Azure Policy allows you to place guardrails on Key Vault and its objects to ensure they're compliant with your organizations security recommendations and compliance regulations. It allows you to perform realtime policy-based enforcement and on-demand compliance assessment of existing secrets in your Azure environment. The results of audits performed by policy will be available to you in a compliance dashboard where you'll be able to see a drill-down of which resources and components are compliant and which aren't. Azure policy for Key Vault will provide you with a full suite of built-in policies offering governance of your keys, secrets, and certificates.
145
+
Integration of Azure Key Vault with Azure Policy has reached general availability. AzurePolicy lets you place guardrails on Key Vault and its objects to ensure they comply with your organization's security recommendations and compliance regulations. You can perform real-time policy-based enforcement and on-demand compliance assessment of existing secrets in your Azure environment. A compliance dashboard shows which resources and components are compliant.
146
146
147
-
You can learn more about how to [Integrate Azure Key Vault with Azure Policy](./azure-policy.md?tabs=certificates) and assign a new policy. See the [Azure Key Vault policy announcement](https://azure.microsoft.com/updates/gaazurepolicyforkeyvault) for more details.
147
+
Azure Policy for Key Vault provides a full suite of built-in policies for governance of your keys, secrets, and certificates. To learn more, see [Integrate Azure Key Vault with Azure Policy](./azure-policy.md?tabs=certificates). For the announcement, see [Azure Key Vault policy general availability](https://azure.microsoft.com/updates/gaazurepolicyforkeyvault).
148
148
149
149
## June 2021
150
150
151
-
Azure Key Vault Managed HSM is generally available. Managed HSM offers a fully managed, highly available, single-tenant, high-throughput, standards-compliant cloud service to safeguard cryptographic keys for your cloud applications, using FIPS 140-2 Level 3 validated HSMs.
151
+
Azure Key Vault Managed HSM is generally available. Managed HSM offers a fully managed, highly available, single-tenantcloud service to safeguard cryptographic keys for your cloud applications using FIPS 140-2 Level 3 validated HSMs.
152
152
153
-
For more information, see [Azure Key Vault Managed HSM Overview](../managed-hsm/overview.md)
153
+
For more information, see [Azure Key Vault Managed HSM overview](../managed-hsm/overview.md).
154
154
155
155
## February 2021
156
156
157
-
Azure role-based access control (RBAC) for Azure Key Vault data plane authorization is now generally available. With this capability, you can now manage RBAC for Key Vault keys, certificates, and secrets with roles assignment scope available from management group to individual key, certificate, and secret.
157
+
Azure role-based access control (RBAC) for Azure Key Vault data plane authorization is now generally available. You can now manage RBAC for Key Vault keys, certificates, and secrets with role assignment scopes from management group to individual key, certificate, and secret.
158
158
159
-
For more information, see [Provide access to Key Vault keys, certificates, and secrets with an Azure role-based access control](rbac-guide.md)
159
+
For more information, see [Provide access to Key Vault keys, certificates, and secrets with Azure role-based access control](rbac-guide.md).
160
160
161
161
## October 2020
162
162
@@ -197,7 +197,7 @@ Private endpoints now available in preview. Azure Private Link Service enables y
197
197
198
198
New features and integrations released this year:
199
199
200
-
- Integration with Azure Functions. For an example scenario leveraging[Azure Functions](/azure/azure-functions/) for key vault operations, see [Automate the rotation of a secret](../secrets/tutorial-rotation.md).
200
+
- Integration with Azure Functions. For an example scenario that uses[Azure Functions](/azure/azure-functions/) for key vault operations, see [Automate the rotation of a secret](../secrets/tutorial-rotation.md).
201
201
-[Integration with Azure Databricks](./integrate-databricks-blob-storage.md). With this, Azure Databricks now supports two types of secret scopes: Azure Key Vault-backed and Databricks-backed. For more information, see [Create an Azure Key Vault-backed secret scope](/azure/databricks/security/secrets/secret-scopes#--create-an-azure-key-vault-backed-secret-scope)
202
202
-[Virtual network service endpoints for Azure Key Vault](overview-vnet-service-endpoints.md).
203
203
@@ -232,7 +232,7 @@ Second preview version (version 2015-02-01-preview) was announced April 20, 2015
232
232
- Create a secret - added tags as optional information.
233
233
- Update a key - added tags as optional information.
234
234
- Update a secret - added tags as optional information.
235
-
- Changed max size for secrets from 10 K to 25 K Bytes. See,[About keys, secrets, and certificates](about-keys-secrets-certificates.md).
235
+
- Changed max size for secrets from 10 K to 25 K Bytes. See [About keys, secrets, and certificates](about-keys-secrets-certificates.md).
0 commit comments