Skip to content

Commit bab4da4

Browse files
committed
Update access-control-default with Mooncake/Fairfax, preview deprecation, SDK links
1 parent c616ee8 commit bab4da4

1 file changed

Lines changed: 6 additions & 2 deletions

File tree

articles/key-vault/general/access-control-default.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: mbaldwin
66
ms.service: azure-key-vault
77
ms.subservice: general
88
ms.topic: how-to
9-
ms.date: 02/27/2026
9+
ms.date: 03/24/2026
1010
ms.custom: devx-track-azurepowershell, devx-track-azurecli, sfi-image-nochange
1111

1212
#customer intent: As an Azure Key Vault administrator, I want to migrate from access policies to Azure RBAC so that I can improve security and simplify access management.
@@ -15,15 +15,19 @@ ms.custom: devx-track-azurepowershell, devx-track-azurecli, sfi-image-nochange
1515

1616
# Prepare for Key Vault API version 2026-02-01 and later: Azure RBAC as default access control
1717

18-
Azure Key Vault API version 2026-02-01 and later change the default access control model for new vaults to Azure RBAC, consistent with the Azure portal experience. Both Azure RBAC and access policies remain fully supported.
18+
Azure Key Vault API version 2026-02-01 and later change the default access control model for new vaults to Azure RBAC, consistent with the Azure portal experience. Both Azure RBAC and access policies remain fully supported. API version 2026-02-01 is available in public Azure regions, Mooncake, and Fairfax.
1919

2020
- **New key vault creation behavior**: When you create a new vault with API version `2026-02-01` or later, the default access control model is Azure RBAC (`enableRbacAuthorization = true`). This default applies only to **create** operations. To use access policies for new vaults, set `enableRbacAuthorization` to `false` at creation time.
2121
- **Existing key vault behavior**: Existing vaults keep their current access control model unless you explicitly change `enableRbacAuthorization`. Using API version `2026-02-01` or later to update a vault does not automatically change access control. Vaults where `enableRbacAuthorization` is `null` (from older API versions) continue using access policies.
2222

2323
> [!IMPORTANT]
2424
> All Key Vault Control Plane API versions before 2026-02-01 retire on February 27, 2027. Adopt API version 2026-02-01 or later before this date. Data Plane APIs are not affected.
25+
>
26+
> Preview API versions (except 2026-04-01-preview) are being deprecated with a 90-day notice period.
2527
>
2628
> Note that Azure Cloud Shell always uses the latest API version. If you have scripts that run in Cloud Shell, ensure they are compatible with API version 2026-02-01 or later.
29+
>
30+
> Control plane management SDKs supporting API version 2026-02-01 are available for all languages. For package details, see [What's new for Azure Key Vault](whats-new.md#control-plane-sdk-releases).
2731
2832
We encourage you to migrate key vaults that currently use access policies (legacy) to Azure RBAC for improved security. For more information on why Azure RBAC is recommended, see [Azure role-based access control (Azure RBAC) vs. access policies](rbac-access-policy.md).
2933

0 commit comments

Comments
 (0)