You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
#customer intent: As an Azure Key Vault administrator, I want to migrate from access policies to Azure RBAC so that I can improve security and simplify access management.
# Prepare for Key Vault API version 2026-02-01 and later: Azure RBAC as default access control
17
17
18
-
Azure Key Vault API version 2026-02-01 and later change the default access control model for new vaults to Azure RBAC, consistent with the Azure portal experience. Both Azure RBAC and access policies remain fully supported. API version 2026-02-01 is available in public Azure regions, Mooncake, and Fairfax.
18
+
Azure Key Vault API version 2026-02-01 and later change the default access control model for new vaults to Azure RBAC, consistent with the Azure portal experience. Both Azure RBAC and access policies remain fully supported. API version 2026-02-01 is available in public Azure regions, Azure operated by 21Vianet, and Azure Government.
19
19
20
20
-**New key vault creation behavior**: When you create a new vault with API version `2026-02-01` or later, the default access control model is Azure RBAC (`enableRbacAuthorization = true`). This default applies only to **create** operations. To use access policies for new vaults, set `enableRbacAuthorization` to `false` at creation time.
21
21
-**Existing key vault behavior**: Existing vaults keep their current access control model unless you explicitly change `enableRbacAuthorization`. Using API version `2026-02-01` or later to update a vault does not automatically change access control. Vaults where `enableRbacAuthorization` is `null` (from older API versions) continue using access policies.
22
22
23
23
> [!IMPORTANT]
24
-
> All Key Vault Control Plane API versions before 2026-02-01 retire on February 27, 2027. Data Plane APIs are not affected.
24
+
> All Key Vault control plane API versions before 2026-02-01 retire on February 27, 2027. Your key vaults will continue to exist and remain manageable with control plane API versions 2026-02-01 or later. Data plane APIs are not affected.
25
25
26
26
Preview API versions (except 2026-04-01-preview) are being deprecated with a 90-day notice period. Azure Cloud Shell always uses the latest API version. If you have scripts that run in Cloud Shell, ensure they're compatible with API version 2026-02-01 or later. For a list of supported API versions, see [Supported control plane API versions](whats-new.md#supported-control-plane-api-versions). For SDK package details, see [What's new for Azure Key Vault](whats-new.md#control-plane-sdk-releases).
27
27
@@ -32,7 +32,7 @@ We encourage you to migrate key vaults that currently use access policies (legac
32
32
If you already know your vault's access control model, skip to [Determine your next steps](#determine-your-next-steps). Otherwise, [check your current configuration](#check-your-current-configuration) first.
33
33
34
34
> [!IMPORTANT]
35
-
> To change the `enableRbacAuthorization` property for a key vault, you must have the `Microsoft.Authorization/roleAssignments/write` permission. This permission is included in roles such as Owner and User Access Administrator. For more information, see [Enable Azure RBAC permissions on Key Vault](rbac-guide.md#enable-azure-rbac-permissions-on-key-vault).
35
+
> To change the `enableRbacAuthorization` property for a key vault, you must have the `Microsoft.KeyVault/vaults/write` permission (included in roles such as Contributor and Owner). The Azure portal additionally requires `Microsoft.Authorization/roleAssignments/write` (included in roles such as Owner and User Access Administrator) to ensure you can assign Key Vault RBAC roles after the change and avoid lockout. For more information, see [Enable Azure RBAC permissions on Key Vault](rbac-guide.md#enable-azure-rbac-permissions-on-key-vault).
36
36
37
37
## Check your current configuration
38
38
@@ -116,7 +116,7 @@ az keyvault list --resource-group <resource-group> --query "[].{name:name, rbacE
116
116
117
117
---
118
118
119
-
### Check multiple vaults by subscription ID
119
+
### Check multiple vaults across your subscription
120
120
121
121
# [Azure CLI](#tab/azure-cli)
122
122
@@ -169,7 +169,7 @@ Based on your current access control model, follow the appropriate guidance belo
169
169
170
170
### Vaults using Azure RBAC
171
171
172
-
If your key vaults already use Azure RBAC, no access control changes are needed. However, you must update all Key Vault control plane management SDKs, ARM, BICEP, Terraform templates, and [REST API](/rest/api/keyvault/) calls to use API version 2026-02-01 or later before February 27, 2027, when older control plane API versions retire.
172
+
If your key vaults already use Azure RBAC, no access control changes are needed. However, you must update all Key Vault control plane management SDKs, ARM, Bicep, Terraform templates, and [REST API](/rest/api/keyvault/) calls to use API version 2026-02-01 or later before February 27, 2027, when older control plane API versions retire.
173
173
174
174
### Vaults using access policies
175
175
@@ -186,25 +186,25 @@ Choose your path:
186
186
187
187
Use this opportunity to increase your security posture by migrating from vault access policies to Azure RBAC. For detailed migration guidance, see [Migrate from vault access policy to an Azure role-based access control permission model](rbac-migration.md).
188
188
189
-
After migrating, update all Key Vault control plane management SDKs, ARM, BICEP, Terraform templates, and REST API calls to use API version 2026-02-01 or later.
189
+
After migrating, update all Key Vault control plane management SDKs, ARM, Bicep, Terraform templates, and REST API calls to use API version 2026-02-01 or later.
Access policies remain a fully supported access control model.
196
196
197
-
-**Existing vaults**: Vaults already using access policies continue to work without changes. Just ensure your control plane management SDKs, ARM, BICEP, Terraform templates, and REST API calls use API version 2026-02-01 or later before February 27, 2027.
197
+
-**Existing vaults**: Vaults already using access policies continue to work without changes. Just ensure your control plane management SDKs, ARM, Bicep, Terraform templates, and REST API calls use API version 2026-02-01 or later before February 27, 2027.
198
198
-**New vaults**: When creating new vaults with API version 2026-02-01 or later, you must explicitly set `enableRbacAuthorization` to `false` to use access policies, as described below.
199
199
200
200
Choose one of the following methods based on your scenario:
When creating new key vaults by using API version 2026-02-01 or later, set `enableRbacAuthorization` to `false` in all Key Vault ARM, BICEP, Terraform templates, and [REST API](/rest/api/keyvault/) calls to use access policies (legacy).
207
+
When creating new key vaults by using API version 2026-02-01 or later, set `enableRbacAuthorization` to `false` in all Key Vault ARM, Bicep, Terraform templates, and [REST API](/rest/api/keyvault/) calls to use access policies (legacy).
0 commit comments