Skip to content

Commit 3152409

Browse files
Merge pull request #2721 from MicrosoftDocs/main
Auto Publish – main to live - 2026-04-10 22:04 UTC
2 parents fcfeaae + c214b38 commit 3152409

87 files changed

Lines changed: 515 additions & 922 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.redirection.key-vault.json

Lines changed: 40 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -102,12 +102,12 @@
102102
},
103103
{
104104
"source_path_from_root": "/articles/key-vault/general/group-permissions-for-apps.md",
105-
"redirect_url": "/azure/key-vault/general/assign-access-policy-cli",
105+
"redirect_url": "/azure/key-vault/general/assign-access-policy",
106106
"redirect_document_id": false
107107
},
108108
{
109109
"source_path_from_root": "/articles/key-vault/general/import-cert-faqs.yml",
110-
"redirect_url": "/azure/key-vault/general/faq",
110+
"redirect_url": "/azure/key-vault/certificates/certificate-scenarios",
111111
"redirect_document_id": false
112112
},
113113
{
@@ -117,12 +117,12 @@
117117
},
118118
{
119119
"source_path_from_root": "/articles/key-vault/general/key-vault-security-controls.md",
120-
"redirect_url": "/azure/key-vault/general/security-baseline",
120+
"redirect_url": "/azure/key-vault/security-controls-policy",
121121
"redirect_document_id": false
122122
},
123123
{
124124
"source_path_from_root": "/articles/key-vault/general/managed-identity.md",
125-
"redirect_url": "/azure/key-vault/general/assign-access-policy-portal",
125+
"redirect_url": "/azure/key-vault/general/assign-access-policy",
126126
"redirect_document_id": false
127127
},
128128
{
@@ -132,7 +132,7 @@
132132
},
133133
{
134134
"source_path_from_root": "/articles/key-vault/general/overview-security.md",
135-
"redirect_url": "/azure/key-vault/general/security-features",
135+
"redirect_url": "/azure/key-vault/general/secure-key-vault",
136136
"redirect_document_id": false
137137
},
138138
{
@@ -142,17 +142,17 @@
142142
},
143143
{
144144
"source_path_from_root": "/articles/key-vault/general/secure-your-key-vault.md",
145-
"redirect_url": "/azure/key-vault/general/security-features",
145+
"redirect_url": "/azure/key-vault/general/secure-key-vault",
146146
"redirect_document_id": false
147147
},
148148
{
149149
"source_path_from_root": "/articles/key-vault/general/security-overview.md",
150-
"redirect_url": "/azure/key-vault/general/security-features",
150+
"redirect_url": "/azure/key-vault/general/secure-key-vault",
151151
"redirect_document_id": false
152152
},
153153
{
154154
"source_path_from_root": "/articles/key-vault/general/security-recommendations.md",
155-
"redirect_url": "/azure/key-vault/general/security-features",
155+
"redirect_url": "/azure/key-vault/general/secure-key-vault",
156156
"redirect_document_id": false
157157
},
158158
{
@@ -192,12 +192,12 @@
192192
},
193193
{
194194
"source_path_from_root": "/articles/key-vault/hsm-protected-keys-legacy.md",
195-
"redirect_url": "/azure/key-vault/keys/hsm-protected-keys-legacy",
195+
"redirect_url": "/azure/key-vault/keys/hsm-protected-keys-byok",
196196
"redirect_document_id": false
197197
},
198198
{
199199
"source_path_from_root": "/articles/key-vault/hsm-protected-keys-vendor-agnostic-byok.md",
200-
"redirect_url": "/azure/key-vault/keys/hsm-protected-keys-vendor-agnostic-byok",
200+
"redirect_url": "/azure/key-vault/keys/hsm-protected-keys-byok",
201201
"redirect_document_id": false
202202
},
203203
{
@@ -207,12 +207,12 @@
207207
},
208208
{
209209
"source_path_from_root": "/articles/key-vault/key-vault-best-practices.md",
210-
"redirect_url": "/azure/key-vault/general/security-features",
210+
"redirect_url": "/azure/key-vault/general/secure-key-vault",
211211
"redirect_document_id": false
212212
},
213213
{
214214
"source_path_from_root": "/articles/key-vault/key-vault-customer-data.md",
215-
"redirect_url": "/azure/key-vault/general/customer-data",
215+
"redirect_url": "/azure/key-vault/general/monitor-key-vault",
216216
"redirect_document_id": false
217217
},
218218
{
@@ -222,22 +222,22 @@
222222
},
223223
{
224224
"source_path_from_root": "/articles/key-vault/key-vault-disaster-recovery-guidance.md",
225-
"redirect_url": "/azure/key-vault/general/disaster-recovery-guidance",
225+
"redirect_url": "/azure/reliability/reliability-key-vault",
226226
"redirect_document_id": false
227227
},
228228
{
229229
"source_path_from_root": "/articles/key-vault/key-vault-dotnet2api-release-notes.md",
230-
"redirect_url": "/azure/key-vault/general/dotnet2api-release-notes",
230+
"redirect_url": "/azure/key-vault/general/client-libraries",
231231
"redirect_document_id": false
232232
},
233233
{
234234
"source_path_from_root": "/articles/key-vault/key-vault-get-started.md",
235-
"redirect_url": "/azure/key-vault/key-vault-overview",
235+
"redirect_url": "/azure/key-vault/general/overview",
236236
"redirect_document_id": false
237237
},
238238
{
239239
"source_path_from_root": "/articles/key-vault/key-vault-group-permissions-for-apps.md",
240-
"redirect_url": "/azure/key-vault/general/assign-access-policy-cli",
240+
"redirect_url": "/azure/key-vault/general/assign-access-policy",
241241
"redirect_document_id": false
242242
},
243243
{
@@ -247,7 +247,7 @@
247247
},
248248
{
249249
"source_path_from_root": "/articles/key-vault/key-vault-key-rotation-log-monitoring.md",
250-
"redirect_url": "/azure/key-vault/secrets/key-rotation-log-monitoring",
250+
"redirect_url": "/azure/key-vault/secrets/tutorial-rotation-dual",
251251
"redirect_document_id": false
252252
},
253253
{
@@ -277,7 +277,7 @@
277277
},
278278
{
279279
"source_path_from_root": "/articles/key-vault/key-vault-overview-storage-keys-powershell.md",
280-
"redirect_url": "/azure/key-vault/secrets/overview-storage-keys-powershell",
280+
"redirect_url": "/azure/storage/common/authorize-data-access",
281281
"redirect_document_id": false
282282
},
283283
{
@@ -302,7 +302,7 @@
302302
},
303303
{
304304
"source_path_from_root": "/articles/key-vault/key-vault-ovw-storage-keys.md",
305-
"redirect_url": "/azure/key-vault/secrets/overview-storage-keys",
305+
"redirect_url": "/azure/storage/common/authorize-data-access",
306306
"redirect_document_id": false
307307
},
308308
{
@@ -312,27 +312,27 @@
312312
},
313313
{
314314
"source_path_from_root": "/articles/key-vault/key-vault-secure-your-key-vault.md",
315-
"redirect_url": "/azure/key-vault/general/security-features",
315+
"redirect_url": "/azure/key-vault/general/secure-key-vault",
316316
"redirect_document_id": false
317317
},
318318
{
319319
"source_path_from_root": "/articles/key-vault/key-vault-security-controls.md",
320-
"redirect_url": "/azure/key-vault/general/security-baseline",
320+
"redirect_url": "/azure/key-vault/security-controls-policy",
321321
"redirect_document_id": false
322322
},
323323
{
324324
"source_path_from_root": "/articles/key-vault/key-vault-service-limits.md",
325-
"redirect_url": "/azure/key-vault/general/service-limits.",
325+
"redirect_url": "/azure/key-vault/general/service-limits",
326326
"redirect_document_id": false
327327
},
328328
{
329329
"source_path_from_root": "/articles/key-vault/key-vault-soft-delete-cli.md",
330-
"redirect_url": "/azure/key-vault/general/soft-delete-cli",
330+
"redirect_url": "/azure/key-vault/general/key-vault-recovery?tabs=azure-cli",
331331
"redirect_document_id": false
332332
},
333333
{
334334
"source_path_from_root": "/articles/key-vault/key-vault-soft-delete-powershell.md",
335-
"redirect_url": "/azure/key-vault/general/soft-delete-powershell",
335+
"redirect_url": "/azure/key-vault/general/key-vault-recovery?tabs=azure-powershell",
336336
"redirect_document_id": false
337337
},
338338
{
@@ -342,7 +342,7 @@
342342
},
343343
{
344344
"source_path_from_root": "/articles/key-vault/key-vault-use-from-web-application.md",
345-
"redirect_url": "/azure/key-vault/tutorial-net-create-vault-azure-web-app",
345+
"redirect_url": "/azure/key-vault/general/tutorial-net-create-vault-azure-web-app",
346346
"redirect_document_id": false
347347
},
348348
{
@@ -357,7 +357,7 @@
357357
},
358358
{
359359
"source_path_from_root": "/articles/key-vault/key-vault-whatis.md",
360-
"redirect_url": "/azure/key-vault/basic-concepts",
360+
"redirect_url": "/azure/key-vault/general/basic-concepts",
361361
"redirect_document_id": false
362362
},
363363
{
@@ -367,7 +367,7 @@
367367
},
368368
{
369369
"source_path_from_root": "/articles/key-vault/keyvault-moveregion.md",
370-
"redirect_url": "/azure/key-vault/general/move-region",
370+
"redirect_url": "/azure/operational-excellence/relocation-key-vault",
371371
"redirect_document_id": false
372372
},
373373
{
@@ -377,12 +377,12 @@
377377
},
378378
{
379379
"source_path_from_root": "/articles/key-vault/managed-identity.md",
380-
"redirect_url": "/azure/key-vault/general/assign-access-policy-portal",
380+
"redirect_url": "/azure/key-vault/general/assign-access-policy",
381381
"redirect_document_id": false
382382
},
383383
{
384384
"source_path_from_root": "/articles/key-vault/overview-security.md",
385-
"redirect_url": "/azure/key-vault/general/security-features",
385+
"redirect_url": "/azure/key-vault/general/secure-key-vault",
386386
"redirect_document_id": false
387387
},
388388
{
@@ -407,7 +407,7 @@
407407
},
408408
{
409409
"source_path_from_root": "/articles/key-vault/quick-create-net-v3.md",
410-
"redirect_url": "/azure/key-vault/secrets/quick-create-net-v3",
410+
"redirect_url": "/azure/key-vault/secrets/quick-create-net",
411411
"redirect_document_id": false
412412
},
413413
{
@@ -452,7 +452,7 @@
452452
},
453453
{
454454
"source_path_from_root": "/articles/key-vault/secrets/quick-create-net-v3.md",
455-
"redirect_url": "/azure/key-vault/secrets/quick-create-net-v4",
455+
"redirect_url": "/azure/key-vault/secrets/quick-create-net",
456456
"redirect_document_id": false
457457
},
458458
{
@@ -467,12 +467,12 @@
467467
},
468468
{
469469
"source_path_from_root": "/articles/key-vault/security-baseline.md",
470-
"redirect_url": "/azure/key-vault/general/security-baseline",
470+
"redirect_url": "/azure/key-vault/security-controls-policy",
471471
"redirect_document_id": false
472472
},
473473
{
474474
"source_path_from_root": "/articles/key-vault/security-recommendations.md",
475-
"redirect_url": "/azure/key-vault/general/security-features",
475+
"redirect_url": "/azure/key-vault/general/secure-key-vault",
476476
"redirect_document_id": false
477477
},
478478
{
@@ -482,7 +482,7 @@
482482
},
483483
{
484484
"source_path_from_root": "/articles/key-vault/storage-keys-sas-tokens-code.md",
485-
"redirect_url": "/azure/key-vault/secrets/storage-keys-sas-tokens-code",
485+
"redirect_url": "/azure/storage/common/authorize-data-access",
486486
"redirect_document_id": false
487487
},
488488
{
@@ -517,32 +517,32 @@
517517
},
518518
{
519519
"source_path_from_root": "/articles/key-vault/tutorial-web-application-keyvault.md",
520-
"redirect_url": "/azure/key-vault/tutorial-net-create-vault-azure-web-app",
520+
"redirect_url": "/azure/key-vault/general/tutorial-net-create-vault-azure-web-app",
521521
"redirect_document_id": false
522522
},
523523
{
524524
"source_path_from_root": "/articles/key-vault/vs-key-vault-add-connected-service.md",
525-
"redirect_url": "/azure/key-vault/general/vs-key-vault-add-connected-service",
525+
"redirect_url": "/visualstudio/azure/vs-key-vault-add-connected-service",
526526
"redirect_document_id": false
527527
},
528528
{
529529
"source_path_from_root": "/articles/key-vault/vs-key-vault-aspnet-core-get-started.md",
530-
"redirect_url": "/azure/key-vault/vs-key-vault-add-connected-service",
530+
"redirect_url": "/visualstudio/azure/vs-key-vault-add-connected-service",
531531
"redirect_document_id": true
532532
},
533533
{
534534
"source_path_from_root": "/articles/key-vault/vs-key-vault-aspnet-core-what-happened.md",
535-
"redirect_url": "/azure/key-vault/vs-key-vault-add-connected-service",
535+
"redirect_url": "/visualstudio/azure/vs-key-vault-add-connected-service",
536536
"redirect_document_id": false
537537
},
538538
{
539539
"source_path_from_root": "/articles/key-vault/vs-key-vault-aspnet-get-started.md",
540-
"redirect_url": "/azure/key-vault/vs-key-vault-add-connected-service",
540+
"redirect_url": "/visualstudio/azure/vs-key-vault-add-connected-service",
541541
"redirect_document_id": false
542542
},
543543
{
544544
"source_path_from_root": "/articles/key-vault/vs-key-vault-aspnet-what-happened.md",
545-
"redirect_url": "/azure/key-vault/vs-key-vault-add-connected-service",
545+
"redirect_url": "/visualstudio/azure/vs-key-vault-add-connected-service",
546546
"redirect_document_id": false
547547
},
548548
{

articles/key-vault/certificates/about-certificates.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: msmbaldwin
77
ms.service: azure-key-vault
88
ms.subservice: certificates
99
ms.topic: overview
10-
ms.date: 04/14/2025
10+
ms.date: 04/10/2026
1111

1212
ms.author: mbaldwin
1313
ms.custom: sfi-image-nochange
@@ -23,7 +23,7 @@ Azure Key Vault certificate support provides for management of your X.509 certif
2323
- Allows a certificate owner to provide contact information for notifications about the lifecycle events of expiration and renewal.
2424
- Supports automatic renewal with selected issuers: Key Vault partner X.509 certificate providers and CAs.
2525

26-
> [!Note]
26+
> [!NOTE]
2727
> Non-partnered providers and authorities are also allowed but don't support automatic renewal.
2828
2929
For details on certificate creation, see [Certificate creation methods](create-certificate.md).
@@ -65,14 +65,14 @@ A response includes these additional read-only attributes:
6565
- `exp`: `IntDate` contains the value of the expiration date of the X.509 certificate.
6666
- `nbf`: `IntDate` contains the value of the "not before" date of the X.509 certificate.
6767

68-
> [!Note]
68+
> [!NOTE]
6969
> If a Key Vault certificate expires it can still be retrieved, but certificate may become inoperable in scenarios like TLS protection where expiration of certificate is validated.
7070
7171
### Tags
7272

7373
Tags for certificates are a client-specified dictionary of key/value pairs, much like tags in keys and secrets.
7474

75-
> [!Note]
75+
> [!NOTE]
7676
> A caller can read tags if they have the *list* or *get* permission to that object type (keys, secrets, or certificates).
7777
7878
## Certificate policy
@@ -130,13 +130,13 @@ Before a certificate issuer can be created in a key vault, an administrator must
130130

131131
1. Create requester credentials for Key Vault to enroll (and renew) TLS/SSL certificates. This step provides the configuration for creating an issuer object of the provider in the key vault.
132132

133-
For more information on creating issuer objects from the certificate portal, see the [Key Vault Team Blog](/archive/blogs/kv/manage-certificates-via-azure-key-vault).
133+
For more information on creating issuer objects from the certificate portal, see [Integrating Key Vault with certificate authorities](./how-to-integrate-certificate-authority.md).
134134

135135
Key Vault allows for the creation of multiple issuer objects with different issuer provider configurations. After an issuer object is created, its name can be referenced in one or multiple certificate policies. Referencing the issuer object instructs Key Vault to use the configuration as specified in the issuer object when it's requesting the X.509 certificate from the CA provider during certificate creation and renewal.
136136

137137
Issuer objects are created in the vault. They can be used only with Key Vault certificates in the same vault.
138138

139-
>[!Note]
139+
>[!NOTE]
140140
>Publicly trusted certificates are sent to CAs and certificate transparency (CT) logs outside the Azure boundary during enrollment. They're covered by the GDPR policies of those entities.
141141
142142
## Certificate contacts

0 commit comments

Comments
 (0)