You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -90,7 +90,7 @@ The certificate request has now been successfully merged.
90
90
1. Merge the signed request in Key Vault. After the certificate request has been signed, you can merge it with the initial private/public key pair created in Azure Key Vault.
Copy file name to clipboardExpand all lines: articles/key-vault/certificates/how-to-export-certificate.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ ms.service: azure-key-vault
9
9
ms.subservice: certificates
10
10
ms.topic: how-to
11
11
ms.custom: mvc, sfi-image-nochange
12
-
ms.date: 01/30/2026
12
+
ms.date: 03/26/2026
13
13
14
14
ms.author: mbaldwin
15
15
#Customer intent: As a security admin who is new to Azure, I want to use Key Vault to securely store certificates in Azure.
@@ -77,12 +77,12 @@ For more information, see [parameter definitions](/cli/azure/keyvault/secret#az-
77
77
78
78
# [PowerShell](#tab/azure-powershell)
79
79
80
-
Use this command in Azure PowerShell to get the certificate named **TestCert01**from the key vault named **ContosoKV01**. To download the certificate as a PFX file, run following command. These commands access **SecretId**, and then save the content as a PFX file.
80
+
Use this command in Azure PowerShell to get a certificate from your key vault. To download the certificate as a PFX file, run the following command. These commands access **SecretId**, and then save the content as a PFX file.
Copy file name to clipboardExpand all lines: articles/key-vault/certificates/how-to-integrate-certificate-authority.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -111,17 +111,17 @@ You can use Azure PowerShell to create and manage Azure resources by using comma
111
111
1. Create an Azure resource group by using [New-AzResourceGroup](/powershell/module/az.resources/new-azresourcegroup). A resource group is a logical container into which Azure resources are deployed and managed.
3. Define variables for the following values from your DigiCert CertCentral account:
@@ -138,14 +138,14 @@ You can use Azure PowerShell to create and manage Azure resources by using comma
138
138
139
139
4. Set the issuer. Doing so will add Digicert as a certificate authority in the key vault. [Learn more about the parameters.](/powershell/module/az.keyvault/Set-AzKeyVaultCertificateIssuer)
Copy file name to clipboardExpand all lines: articles/key-vault/certificates/overview-renew-certificate.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ author: msmbaldwin
7
7
ms.service: azure-key-vault
8
8
ms.subservice: certificates
9
9
ms.topic: overview
10
-
ms.date: 04/14/2025
10
+
ms.date: 03/26/2026
11
11
12
12
ms.author: mbaldwin
13
13
---
@@ -61,7 +61,7 @@ To renew a nonintegrated CA certificate:
61
61
1. On the certificate pane, select **New Version**.
62
62
3. On the **Create a certificate** page, make sure the **Generate** option is selected under **Method of Certificate Creation**.
63
63
4. Verify the **Subject** and other details about the certificate and then select **Create**.
64
-
5. You should now see the message **The creation of certificate << certificatename >> is currently pending. Click here to go its Certificate Operation to monitor the progress**
64
+
5. You should now see the message **The creation of certificate `<certificate-name>` is currently pending. Click here to go its Certificate Operation to monitor the progress**
65
65
1. Select on the message and a new pane should be shown. The pane should show the status as "In Progress". At this point, Key Vault has generated a CSR that you can download using the **Download CSR** option.
66
66
1. Select **Download CSR** to download a CSR file to your local drive.
67
67
1. Send the CSR to your choice of CA to sign the request.
@@ -73,29 +73,29 @@ To renew a nonintegrated CA certificate:
73
73
Use the Azure CLI [az keyvault certificate create](/cli/azure/keyvault/certificate#az-keyvault-certificate-create) command, providing the name of the certificate you wish to renew:
After renewing the certificate, you can view all the versions of the certificate using the Azure CLI [az keyvault certificate list-versions](/cli/azure/keyvault/certificate#az-keyvault-certificate-list) command:
80
80
81
81
```azurecli-interactive
82
-
az keyvault certificate list-versions --vault-name "<your-unique-keyvault-name>" -n "<name-of-renewed-certificate>"
82
+
az keyvault certificate list-versions --vault-name "<vault-name>" -n "<certificate-name>"
83
83
```
84
84
85
85
# [Azure PowerShell](#tab/azure-powershell)
86
86
87
87
Use the Azure PowerShell [New-AzKeyVaultCertificatePolicy](/powershell/module/az.keyvault/new-azkeyvaultcertificatepolicy) cmdlet, providing the name of the certificate you wish to renew:
After renewing the certificate, you can view all the versions of the certificate using the Azure PowerShell [Get-AzKeyVaultCertificate](/cli/azure/keyvault/certificate#az-keyvault-certificate-list) cmdlet:
You can now reference this certificate that you added to Azure Key Vault by using its URI. Use **`https://<your-unique-keyvault-name>.vault.azure.net/certificates/ExampleCertificate`** to get the current version.
46
+
You can now reference this certificate that you added to Azure Key Vault by using its URI. Use **`https://<vault-name>.vault.azure.net/certificates/ExampleCertificate`** to get the current version.
47
47
48
48
To view previously stored certificate:
49
49
50
50
```azurecli
51
51
52
-
az keyvault certificate show --name "ExampleCertificate" --vault-name "<your-unique-keyvault-name>"
52
+
az keyvault certificate show --name "ExampleCertificate" --vault-name "<vault-name>"
53
53
```
54
54
55
55
Now, you have created a Key Vault, stored a certificate, and retrieved it.
@@ -129,19 +129,19 @@ This application is using your key vault name as an environment variable called
129
129
Windows
130
130
131
131
```cmd
132
-
set KEY_VAULT_NAME=<your-key-vault-name>
132
+
set KEY_VAULT_NAME=<vault-name>
133
133
````
134
134
135
135
Windows PowerShell
136
136
137
137
```powershell
138
-
$Env:KEY_VAULT_NAME="<your-key-vault-name>"
138
+
$Env:KEY_VAULT_NAME="<vault-name>"
139
139
```
140
140
141
141
macOS or Linux
142
142
143
143
```cmd
144
-
export KEY_VAULT_NAME=<your-key-vault-name>
144
+
export KEY_VAULT_NAME=<vault-name>
145
145
```
146
146
147
147
## Object model
@@ -175,7 +175,7 @@ Application requests to most Azure services must be authorized. Using the [Defau
175
175
176
176
In this quickstart, `DefaultAzureCredential` authenticates to key vault using the credentials of the local development user logged into the Azure CLI. When the application is deployed to Azure, the same `DefaultAzureCredential` code can automatically discover and use a managed identity that is assigned to an App Service, Virtual Machine, or other services. For more information, see [Managed Identity Overview](/entra/identity/managed-identities-azure-resources/overview).
177
177
178
-
In this example, the name of your key vault is expanded to the key vault URI, in the format `https://<your-key-vault-name>.vault.azure.net`. For more information about authenticating to key vault, see [Developer's Guide](/azure/key-vault/general/developers-guide#authenticate-to-key-vault-in-code).
178
+
In this example, the name of your key vault is expanded to the key vault URI, in the format `https://<vault-name>.vault.azure.net`. For more information about authenticating to key vault, see [Developer's Guide](/azure/key-vault/general/developers-guide#authenticate-to-key-vault-in-code).
description: Learn how to create, retrieve, and delete certificates from an Azure key vault using the .NET client library
4
4
author: msmbaldwin
5
5
ms.author: mbaldwin
6
-
ms.date: 01/30/2026
6
+
ms.date: 03/26/2026
7
7
8
8
ms.service: azure-key-vault
9
9
ms.subservice: certificates
@@ -98,16 +98,16 @@ The application obtains the key vault name from an environment variable called `
98
98
99
99
Windows
100
100
```cmd
101
-
set KEY_VAULT_NAME=<your-key-vault-name>
101
+
set KEY_VAULT_NAME=<vault-name>
102
102
````
103
103
Windows PowerShell
104
104
```powershell
105
-
$Env:KEY_VAULT_NAME="<your-key-vault-name>"
105
+
$Env:KEY_VAULT_NAME="<vault-name>"
106
106
```
107
107
108
108
macOS or Linux
109
109
```bash
110
-
export KEY_VAULT_NAME=<your-key-vault-name>
110
+
export KEY_VAULT_NAME=<vault-name>
111
111
```
112
112
113
113
## Object model
@@ -132,7 +132,7 @@ Application requests to most Azure services must be authorized. Using the [Defau
132
132
133
133
In this quickstart, `DefaultAzureCredential` authenticates to key vault using the credentials of the local development user logged into the Azure CLI. When the application is deployed to Azure, the same `DefaultAzureCredential` code can automatically discover and use a managed identity that is assigned to an App Service, Virtual Machine, or other services. For more information, see [Managed Identity Overview](/entra/identity/managed-identities-azure-resources/overview).
134
134
135
-
In this example, the name of your key vault is expanded to the key vault URI, in the format `https://<your-key-vault-name>.vault.azure.net`. For more information about authenticating to key vault, see [Developer's Guide](/azure/key-vault/general/developers-guide#authenticate-to-key-vault-in-code).
135
+
In this example, the name of your key vault is expanded to the key vault URI, in the format `https://<vault-name>.vault.azure.net`. For more information about authenticating to key vault, see [Developer's Guide](/azure/key-vault/general/developers-guide#authenticate-to-key-vault-in-code).
0 commit comments