Skip to content

Commit 954e0df

Browse files
committed
Standardize placeholders in key-vault/managed-hsm
- Convert non-standard placeholders to lowercase kebab-case - Fix curly-brace and uppercase placeholder formats - Update ms.date for modified files Part of placeholder standardization series.
1 parent 3634879 commit 954e0df

5 files changed

Lines changed: 14 additions & 14 deletions

File tree

articles/key-vault/managed-hsm/authorize-azure-resource-manager.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.custom: devx-track-arm-template
88
ms.service: azure-key-vault
99
ms.subservice: managed-hsm
1010
ms.topic: tutorial
11-
ms.date: 04/14/2025
11+
ms.date: 03/26/2026
1212

1313
ms.author: mbaldwin
1414
# Customer intent: As a managed HSM administrator, I want to authorize Azure Resource Manager to perform key management operations via Azure Managed HSM
@@ -23,13 +23,13 @@ Azure Managed HSM doesn't trust Azure Resource Manager by default. However, for
2323
For the Azure portal or Azure Resource Manager to interact with Azure Managed HSM in the same way as Azure Key Vault Standard and Premium, an authorized Managed HSM administrator must allow Azure Resource Manager to act on behalf of the user. To change this behavior and allow users to use Azure portal or Azure Resource Manager to create new keys or list keys, make the following Azure Managed HSM setting update:
2424

2525
```azurecli-interactive
26-
az keyvault setting update --hsm-name <managed-hsm name> --name AllowKeyManagementOperationsThroughARM --value true
26+
az keyvault setting update --hsm-name <hsm-name> --name AllowKeyManagementOperationsThroughARM --value true
2727
```
2828

2929
To disable this trust and revert to the default behavior of Managed HSM:
3030

3131
```azurecli-interactive
32-
az keyvault setting update --hsm-name <managed-hsm name> --name AllowKeyManagementOperationsThroughARM --value false
32+
az keyvault setting update --hsm-name <hsm-name> --name AllowKeyManagementOperationsThroughARM --value false
3333
```
3434

3535
## Next steps

articles/key-vault/managed-hsm/azure-policy.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Integrate Azure Managed HSM with Azure Policy
33
description: Learn how to integrate Azure Managed HSM with Azure Policy
44
author: msmbaldwin
55
ms.author: mbaldwin
6-
ms.date: 04/15/2025
6+
ms.date: 03/26/2026
77
ms.service: azure-key-vault
88
ms.subservice: managed-hsm
99
ms.custom: devx-track-azurecli
@@ -72,15 +72,15 @@ az ad sp show --id a1b76039-a76c-499f-a2dd-846b4cc32627 --query id
7272
Copy the `id` printed and paste it in the following command:
7373

7474
```azurecli-interactive
75-
az keyvault role assignment create --scope / --role "Managed HSM Crypto Auditor" --assignee-object-id "the id printed in previous command" --hsm-name <hsm name>
75+
az keyvault role assignment create --scope / --role "Managed HSM Crypto Auditor" --assignee-object-id "the id printed in previous command" --hsm-name <hsm-name>
7676
```
7777

7878
On Linux or Windows Subsystem of Linux:
7979

8080
```azurecli-interactive
8181
spId=$(az ad sp show --id a1b76039-a76c-499f-a2dd-846b4cc32627 --query id|cut -d "\"" -f2)
8282
echo $spId
83-
az keyvault role assignment create --scope / --role "Managed HSM Crypto Auditor" --assignee-object-id $spId --hsm-name <hsm name>
83+
az keyvault role assignment create --scope / --role "Managed HSM Crypto Auditor" --assignee-object-id $spId --hsm-name <hsm-name>
8484
```
8585

8686
### Create policy assignments - define rules of audit and/or deny

articles/key-vault/managed-hsm/logging.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.author: mbaldwin
77
ms.service: azure-key-vault
88
ms.subservice: managed-hsm
99
ms.topic: tutorial
10-
ms.date: 12/03/2025
10+
ms.date: 03/26/2026
1111
#Customer intent: As a Managed HSM administrator, I want to enable logging for my Managed HSM so I can monitor how and when my HSMs are accessed, and by who.
1212
---
1313

@@ -179,9 +179,9 @@ Individual blobs are stored as text, formatted as JSON. Here's an example log en
179179
```json
180180
[
181181
{
182-
"TenantId": "{tenant-id}",
182+
"TenantId": "<tenant-id>",
183183
"time": "2020-08-31T19:52:39.763Z",
184-
"resourceId": "/SUBSCRIPTIONS/<subscription-id>/RESOURCEGROUPS/<RESOURCE-GROUP>/PROVIDERS/MICROSOFT.KEYVAULT/MANAGEDHSMS/<HSM-NAME>",
184+
"resourceId": "/SUBSCRIPTIONS/<subscription-id>/RESOURCEGROUPS/<resource-group>/PROVIDERS/MICROSOFT.KEYVAULT/MANAGEDHSMS/<hsm-name>",
185185
"operationName": "BackupCreate",
186186
"operationVersion": "7.0",
187187
"category": "AuditEvent",
@@ -193,7 +193,7 @@ Individual blobs are stored as text, formatted as JSON. Here's an example log en
193193
},
194194
"durationMs": 488,
195195
"callerIpAddress": "X.X.X.X",
196-
"identity": "{\"claim\":{\"appid\":\"{application-id}\",\"http_schemas_microsoft_com_identity\":{\"claims\":{\"objectidentifier\":\"{object-id}\"}},\"http_schemas_xmlsoap_org_ws_2005_05_identity\":{\"claims\":{\"upn\":\"<user-email>\"}}}}",
196+
"identity": "{\"claim\":{\"appid\":\"<application-id>\",\"http_schemas_microsoft_com_identity\":{\"claims\":{\"objectidentifier\":\"<object-id>\"}},\"http_schemas_xmlsoap_org_ws_2005_05_identity\":{\"claims\":{\"upn\":\"<user-email>\"}}}}",
197197
"clientInfo": "azsdk-python-core/1.7.0 Python/3.8.2 (Linux-4.19.84-microsoft-standard-x86_64-with-glibc2.29) azsdk-python-azure-keyvault/7.2",
198198
"correlationId": "aaaa0000-bb11-2222-33cc-444444dddddd",
199199
"subnetId": "(unknown)",

articles/key-vault/managed-hsm/quick-create-powershell.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Create and retrieve attributes of a managed key in Azure Key Vault – Az
33
description: Quickstart showing how to set and retrieve a managed key from Azure Key Vault using Azure PowerShell
44
author: msmbaldwin
55
ms.author: mbaldwin
6-
ms.date: 03/13/2026
6+
ms.date: 03/26/2026
77
ms.topic: quickstart
88
ms.service: azure-key-vault
99
ms.subservice: keys
@@ -33,7 +33,7 @@ New-AzResourceGroup -Name "<resource-group>" -Location "<location>"
3333
To create a Managed HSM, you need your Microsoft Entra principal ID. To get your ID, use the Azure PowerShell [Get-AzADUser](/powershell/module/az.resources/get-azaduser) cmdlet, and pass your email address to the `UserPrincipalName` parameter:
3434

3535
```azurepowershell-interactive
36-
Get-AzADUser -UserPrincipalName "<[email protected]>"
36+
Get-AzADUser -UserPrincipalName "<user-principal-name>"
3737
```
3838

3939
Your principal ID is returned in the format, "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx".

articles/key-vault/managed-hsm/tls-offload-library.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: azure-key-vault
77
ms.subservice: managed-hsm
88
ms.custom: devx-track-azurecli
99
ms.topic: get-started
10-
ms.date: 01/30/2026
10+
ms.date: 03/26/2026
1111

1212
ms.author: mbaldwin
1313
---
@@ -116,7 +116,7 @@ For Managed Identities,specify command arguments as follows:
116116
```azurecli
117117
az keyvault role assignment create --hsm-name <hsm-name> \
118118
--role "Managed HSM Crypto User" \
119-
--assignee-object-id <object_id> \
119+
--assignee-object-id <object-id> \
120120
--assignee-principal-type MSI \
121121
--scope /keys
122122
```

0 commit comments

Comments
 (0)