You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/key-vault/general/access-control-default.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,7 +49,7 @@ After checking your configuration:
49
49
50
50
### Check a single vault
51
51
52
-
# [Azure CLI](#tab-azure-cli)
52
+
# [Azure CLI](#tab/azure-cli)
53
53
54
54
1. Use the [az keyvault show](/cli/azure/keyvault#az-keyvault-show) command to retrieve vault details:
55
55
@@ -73,7 +73,7 @@ After checking your configuration:
73
73
74
74
### Check multiple vaults by resource group
75
75
76
-
# [Azure CLI](#tab-azure-cli)
76
+
# [Azure CLI](#tab/azure-cli)
77
77
78
78
Use the [az keyvault list](/cli/azure/keyvault#az-keyvault-list) command to list all vaults in a resource group and check their RBAC authorization status:
79
79
@@ -123,7 +123,7 @@ az keyvault list --resource-group <ResourceGroupName> --query "[].{name:name, rb
123
123
124
124
### Check multiple vaults by subscription ID
125
125
126
-
# [Azure CLI](#tab-azure-cli)
126
+
# [Azure CLI](#tab/azure-cli)
127
127
128
128
Use the [az keyvault list](/cli/azure/keyvault#az-keyvault-list) command to list all vaults in your subscription and check their RBAC authorization status:
129
129
@@ -203,7 +203,7 @@ When creating new key vaults by using API version 2026-02-01, you must specify a
203
203
204
204
Make sure you have the latest version of the Azure CLI or PowerShell modules.
205
205
206
-
# [Azure CLI](#tab-azure-cli)
206
+
# [Azure CLI](#tab/azure-cli)
207
207
208
208
Update Azure CLI to the latest version. For more information, see [How to update the Azure CLI](/cli/azure/update-azure-cli).
209
209
@@ -216,7 +216,7 @@ Update your PowerShell modules to the latest version:
216
216
---
217
217
Use the appropriate command to create a key vault with access policies:
218
218
219
-
# [Azure CLI](#tab-azure-cli)
219
+
# [Azure CLI](#tab/azure-cli)
220
220
221
221
Use the [az keyvault create](/cli/azure/keyvault#az-keyvault-create) command and set `--enable-rbac-authorization false`:
When you create new key vaults by using API version 2026-02-01, set `enableRbacAuthorization` to `false` to use access policies. If you don't specify this property, it defaults to `true` (Azure RBAC).
240
240
241
-
# [Azure CLI](#tab-azure-cli)
241
+
# [Azure CLI](#tab/azure-cli)
242
242
243
243
Use the [az resource create](/cli/azure/resource#az-resource-create) command and set `"enableRbacAuthorization": false` and `--api-version "2026-02-01"`:
0 commit comments