Skip to content

Commit 524b4fc

Browse files
msmbaldwinCopilot
andcommitted
Fix remaining audit items: SDK versions, archived links, style
- Update Java SDK versions: certificates 4.1.3→4.8.6, identity 1.2.0→1.18.2 - Replace archived /archive/blogs/kv/ links with current docs equivalents - Update toc.yml blog link to Tech Community - Modernize certificate-scenarios.md: remove KV abbreviations, fix informal style, replace 'we' usage, use contractions, proper [!NOTE] admonition, fix numbered list style, improve grammar throughout - Add ai-usage: ai-assisted to certificate-scenarios.md Co-authored-by: Copilot <[email protected]>
1 parent c5bbda6 commit 524b4fc

4 files changed

Lines changed: 39 additions & 37 deletions

File tree

articles/key-vault/certificates/about-certificates.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -130,7 +130,7 @@ Before a certificate issuer can be created in a key vault, an administrator must
130130

131131
1. Create requester credentials for Key Vault to enroll (and renew) TLS/SSL certificates. This step provides the configuration for creating an issuer object of the provider in the key vault.
132132

133-
For more information on creating issuer objects from the certificate portal, see the [Key Vault Team Blog](/archive/blogs/kv/manage-certificates-via-azure-key-vault).
133+
For more information on creating issuer objects from the certificate portal, see [Integrating Key Vault with certificate authorities](./how-to-integrate-certificate-authority.md).
134134

135135
Key Vault allows for the creation of multiple issuer objects with different issuer provider configurations. After an issuer object is created, its name can be referenced in one or multiple certificate policies. Referencing the issuer object instructs Key Vault to use the configuration as specified in the issuer object when it's requesting the X.509 certificate from the CA provider during certificate creation and renewal.
136136

articles/key-vault/certificates/certificate-scenarios.md

Lines changed: 35 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -10,16 +10,17 @@ ms.date: 04/10/2026
1010

1111
ms.author: mbaldwin
1212
ms.custom: sfi-image-nochange
13+
ai-usage: ai-assisted
1314
---
1415

1516
# Get started with Key Vault certificates
16-
This guideline helps you get started with certificate management in Key Vault.
1717

18-
List of scenarios covered here:
18+
This article helps you get started with certificate management in Key Vault. It covers the following scenarios:
19+
1920
- Creating your first Key Vault certificate
20-
- Creating a certificate with a Certificate Authority that is partnered with Key Vault
21-
- Creating a certificate with a Certificate Authority that is not partnered with Key Vault
22-
- Import a certificate
21+
- Creating a certificate with a certificate authority (CA) that is partnered with Key Vault
22+
- Creating a certificate with a CA that isn't partnered with Key Vault
23+
- Importing a certificate
2324

2425
## Certificates are complex objects
2526
Certificates are composed of three interrelated resources linked together as a Key Vault certificate; certificate metadata, a key, and a secret.
@@ -29,28 +30,29 @@ Certificates are composed of three interrelated resources linked together as a K
2930

3031

3132
## Creating your first Key Vault certificate
32-
Before a certificate can be created in a Key Vault (KV), prerequisite steps 1 and 2 must be successfully accomplished and a key vault must exist for this user / organization.
33+
Before a certificate can be created in Key Vault, the following prerequisite steps must be completed and a key vault must exist for this user or organization.
3334

34-
**Step 1:** Certificate Authority (CA) Providers
35-
- On-boarding as the IT Admin, PKI Admin or anyone managing accounts with CAs, for a given company (for example, Contoso) is a prerequisite to using Key Vault certificates.
36-
The following CAs are the current partnered providers with Key Vault. For more information, see [Partnered CA Providers](./create-certificate.md#partnered-ca-providers).
35+
**Step 1:** Certificate authority (CA) providers
36+
- Onboarding as the IT admin, PKI admin, or anyone managing accounts with CAs, for a given company (for example, Contoso) is a prerequisite to using Key Vault certificates.
37+
The following CAs are the current partnered providers with Key Vault. For more information, see [Partnered CA providers](./create-certificate.md#partnered-ca-providers).
3738
- DigiCert - Key Vault offers OV TLS/SSL certificates with DigiCert.
3839
- GlobalSign - Key Vault offers OV TLS/SSL certificates with GlobalSign.
3940

40-
**Step 2:** An account admin for a CA provider creates credentials to be used by Key Vault to enroll, renew, and use TLS/SSL certificates via Key Vault.
41+
**Step 2:** An account admin for a CA provider creates credentials to be used by Key Vault to enroll, renew, and use TLS/SSL certificates.
4142

4243
**Step 3a:** A Contoso admin, along with a Contoso employee (Key Vault user) who owns certificates, depending on the CA, can get a certificate from the admin or directly from the account with the CA.
4344

44-
- Begin an add credential operation to a key vault by [setting a certificate issuer](/rest/api/keyvault/certificates/set-certificate-issuer/set-certificate-issuer) resource. A certificate issuer is an entity represented in Azure Key Vault (KV) as a CertificateIssuer resource. It is used to provide information about the source of a KV certificate; issuer name, provider, credentials, and other administrative details.
45+
- Begin an add credential operation to a key vault by [setting a certificate issuer](/rest/api/keyvault/certificates/set-certificate-issuer/set-certificate-issuer) resource. A certificate issuer is an entity represented in Azure Key Vault as a CertificateIssuer resource. It provides information about the source of a Key Vault certificate: issuer name, provider, credentials, and other administrative details.
4546
- For example, MyDigiCertIssuer
4647
- Provider
4748
- Credentials – CA account credentials. Each CA has its own specific data.
4849

49-
For more information on creating accounts with CA Providers, see the related post on the [Key Vault blog](/archive/blogs/kv/manage-certificates-via-azure-key-vault).
50+
For more information on creating accounts with CA Providers, see [Integrating Key Vault with certificate authorities](./how-to-integrate-certificate-authority.md).
5051

51-
**Step 3b:** Set up [certificate contacts](/rest/api/keyvault/certificates/set-certificate-contacts/set-certificate-contacts) for notifications. This is the contact for the Key Vault user. Key Vault does not enforce this step.
52+
**Step 3b:** Set up [certificate contacts](/rest/api/keyvault/certificates/set-certificate-contacts/set-certificate-contacts) for notifications. This is the contact for the Key Vault user. Key Vault doesn't enforce this step.
5253

53-
Note - This process, through **Step 3b**, is a onetime operation.
54+
> [!NOTE]
55+
> This process, through **Step 3b**, is a onetime operation.
5456
5557
## Creating a certificate with a CA partnered with Key Vault
5658

@@ -78,25 +80,25 @@ Note - This process, through **Step 3b**, is a onetime operation.
7880
- Because of the delay to create, a cancel operation can be initiated. The cancel may or may not be effective.
7981

8082
### Network security and access policies associated with integrated CA
81-
Key Vault service sends requests to CA (outbound traffic). Therefore, its fully compatible with firewall enabled key vaults. The Key Vault does not share access policies with the CA. The CA must be configured to accept signing requests independently. [Guide on integrating trusted CA](./how-to-integrate-certificate-authority.md)
83+
Key Vault service sends requests to the CA (outbound traffic). Therefore, it's fully compatible with firewall-enabled key vaults. Key Vault doesn't share access policies with the CA. The CA must be configured to accept signing requests independently. For more information, see [Integrating Key Vault with certificate authorities](./how-to-integrate-certificate-authority.md).
8284

8385
## Import a certificate
84-
Alternatively – a cert can be imported into Key Vault PFX or PEM.
86+
Alternatively, you can import a certificate into Key Vault in PFX or PEM format.
8587

86-
Import certificate requires a PEM or PFX to be on disk and have a private key.
87-
- You must specify: vault name and certificate name (policy is optional)
88+
Importing a certificate requires a PEM or PFX file on disk that contains a private key.
89+
- You must specify the vault name and certificate name (policy is optional).
8890

89-
- PEM / PFX files contains attributes that KV can parse and use to populate the certificate policy. If a certificate policy is already specified, KV will try to match data from PFX / PEM file.
91+
- PEM and PFX files contain attributes that Key Vault can parse and use to populate the certificate policy. If a certificate policy is already specified, Key Vault tries to match data from the PFX or PEM file.
9092

91-
- Once the import is final, subsequent operations will use the new policy (new versions).
93+
- Once the import is final, subsequent operations use the new policy (new versions).
9294

93-
- If there are no further operations, the first thing the Key Vault does is send an expiration notice.
95+
- If there are no further operations, the first thing Key Vault does is send an expiration notice.
9496

95-
- Also, the user can edit the policy, which is functional at the time of import but contains defaults where no information was specified at import. For example, no issuer info
97+
- The user can also edit the policy, which is functional at the time of import but contains defaults where no information was specified at import. For example, no issuer info.
9698

9799
### Formats of import we support
98-
Azure Key Vault supports .pem and .pfx certificate files for importing Certificates into Key vault.
99-
We support the following type of Import for PEM file format. A single PEM encoded certificate along with a PKCS#8 encoded, unencrypted key which has the following format:
100+
Azure Key Vault supports .pem and .pfx certificate files for importing certificates into a key vault.
101+
The following import format is supported for PEM files: a single PEM-encoded certificate along with a PKCS#8-encoded, unencrypted key in the following format:
100102

101103
-----BEGIN CERTIFICATE-----
102104

@@ -106,36 +108,36 @@ We support the following type of Import for PEM file format. A single PEM encode
106108

107109
-----END PRIVATE KEY-----
108110

109-
When you are importing the certificate, you need to ensure that the key is included in the file itself. If you have the private key separately in a different format, you would need to combine the key with the certificate. Some certificate authorities provide certificates in different formats, therefore before importing the certificate, make sure that they are either in .pem or .pfx format.
111+
When you import a certificate, ensure that the key is included in the file itself. If you have the private key separately in a different format, you need to combine the key with the certificate. Some certificate authorities provide certificates in different formats, so before importing the certificate, make sure that it's in .pem or .pfx format.
110112

111113

112114
>[!NOTE]
113115
>Ensure that no other meta data is present in the certificate file and that the private key not showing as encrypted.
114116
115117
### Formats of merge CSR we support
116118

117-
Azure Key Vault supports PKCS#8 encoded certificate with below headers:
119+
Azure Key Vault supports PKCS#8 encoded certificates with the following headers:
118120

119121
-----BEGIN CERTIFICATE-----
120122

121123
-----END CERTIFICATE-----
122124

123125
>[!NOTE]
124-
> P7B (PKCS#7) signed certificates chain, commonly used by Certificate Authorities (CAs), is supported as long as is base64 encoded. You may use [certutil -encode](/windows-server/administration/windows-commands/certutil#-encode) to convert to supported format.
126+
> P7B (PKCS#7) signed certificate chains, commonly used by certificate authorities (CAs), are supported as long as they're base64-encoded. You can use [certutil -encode](/windows-server/administration/windows-commands/certutil#-encode) to convert to a supported format.
125127
126128
## Creating a certificate with a CA not partnered with Key Vault
127-
This method allows working with other CAs than Key Vault's partnered providers, meaning your organization can work with a CA of its choice.
129+
This method allows working with CAs other than Key Vault's partnered providers, meaning your organization can work with a CA of its choice.
128130

129131
![Create a certificate with your own certificate authority](../media/certificate-authority-1.png)
130132

131133
The following step descriptions correspond to the green lettered steps in the preceding diagram.
132134

133-
(1) - In the diagram above, your application is creating a certificate, which internally begins by creating a key in your key vault.
135+
1. In the diagram, your application is creating a certificate, which internally begins by creating a key in your key vault.
134136

135-
(2) - Key Vault returns to your application a Certificate Signing Request (CSR).
137+
1. Key Vault returns a Certificate Signing Request (CSR) to your application.
136138

137-
(3) - Your application passes the CSR to your chosen CA.
139+
1. Your application passes the CSR to your chosen CA.
138140

139-
(4) - Your chosen CA responds with an X509 Certificate.
141+
1. Your chosen CA responds with an X.509 certificate.
140142

141-
(5) - Your application completes the new certificate creation with a merger of the X509 Certificate from your CA.
143+
1. Your application completes the new certificate creation with a merger of the X.509 certificate from your CA.

articles/key-vault/certificates/quick-create-java.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -104,13 +104,13 @@ Open the *pom.xml* file in your text editor. Add the following dependency elemen
104104
<dependency>
105105
<groupId>com.azure</groupId>
106106
<artifactId>azure-security-keyvault-certificates</artifactId>
107-
<version>4.1.3</version>
107+
<version>4.8.6</version>
108108
</dependency>
109109

110110
<dependency>
111111
<groupId>com.azure</groupId>
112112
<artifactId>azure-identity</artifactId>
113-
<version>1.2.0</version>
113+
<version>1.18.2</version>
114114
</dependency>
115115
```
116116

articles/key-vault/certificates/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -113,6 +113,6 @@ items:
113113
- name: Service updates
114114
href: https://azure.microsoft.com/updates/?product=key-vault
115115
- name: Blog
116-
href: /archive/blogs/kv/
116+
href: https://techcommunity.microsoft.com/tag/azure-key-vault
117117
- name: Product Feedback
118118
href: https://feedback.azure.com/d365community/forum/285c5ae0-f524-ec11-b6e6-000d3a4f0da0

0 commit comments

Comments
 (0)