Skip to content

Commit c28c206

Browse files
committed
Add cross-references to RBAC and private endpoint articles
- rbac-access-policy.md: Note that API 2026-02-01 makes RBAC default, link to access-control-default.md - rbac-migration.md: Clarify RBAC default starting with API 2026-02-01, link to access-control-default.md - rbac-guide.md: Important callout for API 2026-02-01 default behavior - private-link-service.md: Note about private endpoint limit enforcement
1 parent 4e7bc1b commit c28c206

4 files changed

Lines changed: 16 additions & 6 deletions

File tree

articles/key-vault/general/private-link-service.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Integrate Key Vault with Azure Private Link
33
description: Learn how to integrate Azure Key Vault with Azure Private Link Service
44
author: msmbaldwin
55
ms.author: mbaldwin
6-
ms.date: 01/30/2026
6+
ms.date: 03/24/2026
77
ms.service: azure-key-vault
88
ms.subservice: general
99
ms.topic: how-to
@@ -18,6 +18,9 @@ An Azure Private Endpoint is a network interface that connects you privately and
1818

1919
For more information, see [What is Azure Private Link?](/azure/private-link/private-link-overview)
2020

21+
> [!IMPORTANT]
22+
> Azure Key Vault enforces limits on the number of private endpoints per vault. For information on these limits, see [Azure Key Vault service limits](service-limits.md).
23+
2124
## Prerequisites
2225

2326
To integrate a key vault with Azure Private Link, you'll need:

articles/key-vault/general/rbac-access-policy.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: msmbaldwin
66
ms.service: azure-key-vault
77
ms.subservice: general
88
ms.topic: how-to
9-
ms.date: 01/30/2026
9+
ms.date: 03/24/2026
1010
ms.author: mbaldwin
1111

1212
---
@@ -22,7 +22,9 @@ The access policy model is a legacy authorization system, native to Key Vault, w
2222

2323
## Data plane access control recommendation
2424

25-
Azure RBAC is the recommended authorization system for the Azure Key Vault data plane. It offers several advantages over Key Vault access policies:
25+
Azure RBAC is the recommended authorization system for the Azure Key Vault data plane. Starting with API version 2026-02-01, Azure RBAC is also the **default access control model for new key vaults**, consistent with the Azure portal experience. For details on this change and guidance for preparing your deployments, see [Prepare for Key Vault API version 2026-02-01 and later](access-control-default.md).
26+
27+
Azure RBAC offers several advantages over Key Vault access policies:
2628
- Azure RBAC provides a unified access control model for Azure resources — the same APIs are used across all Azure services.
2729
- Access management is centralized, providing administrators with a consistent view of access granted to Azure resources.
2830
- The right to grant access to keys, secrets, and certificates is better controlled, requiring Owner or User Access Administrator role membership.

articles/key-vault/general/rbac-guide.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: azure-key-vault
77
ms.subservice: general
88
ms.custom: devx-track-azurecli, devx-track-azurepowershell, sfi-image-nochange, copilot-scenario-highlight
99
ms.topic: how-to
10-
ms.date: 01/30/2026
10+
ms.date: 03/24/2026
1111
ms.author: mbaldwin
1212
---
1313

@@ -16,6 +16,9 @@ ms.author: mbaldwin
1616
> [!NOTE]
1717
> Key Vault resource provider supports two resource types: **vaults** and **managed HSMs**. Access control described in this article only applies to **vaults**. To learn more about access control for managed HSM, see [Managed HSM access control](../managed-hsm/access-control.md).
1818
19+
> [!IMPORTANT]
20+
> Starting with API version 2026-02-01, Azure RBAC is the default access control model for newly created key vaults. For details on this change and how to prepare, see [Prepare for Key Vault API version 2026-02-01 and later](access-control-default.md).
21+
1922
Azure role-based access control (Azure RBAC) is an authorization system built on [Azure Resource Manager](/azure/azure-resource-manager/management/overview) that provides centralized access management of Azure resources.
2023

2124
Azure RBAC allows users to manage keys, secrets, and certificates permissions, and provides one place to manage all permissions across all key vaults.

articles/key-vault/general/rbac-migration.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,13 +6,15 @@ author: msmbaldwin
66
ms.service: azure-key-vault
77
ms.subservice: general
88
ms.topic: how-to
9-
ms.date: 01/30/2026
9+
ms.date: 03/24/2026
1010
ms.author: mbaldwin
1111
ms.custom: sfi-image-nochange
1212
---
1313
# Migrate to Azure RBAC from access policies
1414

15-
Azure Key Vault offers two access control models: Azure role-based access control (Azure RBAC), and an access policy model. Azure RBAC is the default and recommended access control model for Azure Key Vault. For a comparison of the two methods of authorization, see [Azure role-based access control (Azure RBAC) vs. access policies](rbac-access-policy.md).
15+
Azure Key Vault offers two access control models: Azure role-based access control (Azure RBAC), and an access policy model. Azure RBAC is the default and recommended access control model for Azure Key Vault. Starting with API version 2026-02-01, Azure RBAC is the default access control model for new vaults. For a comparison of the two methods of authorization, see [Azure role-based access control (Azure RBAC) vs. access policies](rbac-access-policy.md).
16+
17+
For information on preparing your existing deployments for this change, see [Prepare for Key Vault API version 2026-02-01 and later](access-control-default.md).
1618

1719
This article provides the information necessary to migrate a key vault from an access policy model to an Azure RBAC model.
1820

0 commit comments

Comments
 (0)