Skip to content

Commit c381676

Browse files
msmbaldwinCopilot
andcommitted
Second audit pass: KV abbrevs, grammar, code fences, style
- Replace all KV abbreviations with Key Vault in create-certificate.md - Fix x509 → X.509 casing throughout create-certificate.md - Fix heading casing: Partnered CA Providers → Partnered CA providers - Fix grammar in faq.yml: 'is uses' and 'allows'/'provide with' - Fix code fence language: azure-powershell → azurepowershell in CSR article - Remove | Microsoft Docs from tutorial-rotate-certificates.md title - Fix 'Select on'/'hit Refresh' in overview-renew-certificate.md - Fix 'we' usage in quick-create-java.md - Normalize > [!NOTE] formatting in certificate-scenarios.md - Fix 'meta data' → 'metadata', improve grammar in note admonitions Co-authored-by: Copilot <[email protected]>
1 parent 524b4fc commit c381676

7 files changed

Lines changed: 28 additions & 28 deletions

articles/key-vault/certificates/certificate-scenarios.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ Before a certificate can be created in Key Vault, the following prerequisite ste
4747
- Provider
4848
- Credentials – CA account credentials. Each CA has its own specific data.
4949

50-
For more information on creating accounts with CA Providers, see [Integrating Key Vault with certificate authorities](./how-to-integrate-certificate-authority.md).
50+
For more information on creating accounts with CA providers, see [Integrating Key Vault with certificate authorities](./how-to-integrate-certificate-authority.md).
5151

5252
**Step 3b:** Set up [certificate contacts](/rest/api/keyvault/certificates/set-certificate-contacts/set-certificate-contacts) for notifications. This is the contact for the Key Vault user. Key Vault doesn't enforce this step.
5353

@@ -111,8 +111,8 @@ The following import format is supported for PEM files: a single PEM-encoded cer
111111
When you import a certificate, ensure that the key is included in the file itself. If you have the private key separately in a different format, you need to combine the key with the certificate. Some certificate authorities provide certificates in different formats, so before importing the certificate, make sure that it's in .pem or .pfx format.
112112

113113

114-
>[!NOTE]
115-
>Ensure that no other meta data is present in the certificate file and that the private key not showing as encrypted.
114+
> [!NOTE]
115+
> Ensure that no other metadata is present in the certificate file and that the private key isn't showing as encrypted.
116116
117117
### Formats of merge CSR we support
118118

@@ -122,7 +122,7 @@ Azure Key Vault supports PKCS#8 encoded certificates with the following headers:
122122

123123
-----END CERTIFICATE-----
124124

125-
>[!NOTE]
125+
> [!NOTE]
126126
> P7B (PKCS#7) signed certificate chains, commonly used by certificate authorities (CAs), are supported as long as they're base64-encoded. You can use [certutil -encode](/windows-server/administration/windows-commands/certutil#-encode) to convert to a supported format.
127127
128128
## Creating a certificate with a CA not partnered with Key Vault

articles/key-vault/certificates/create-certificate-signing-request.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ The certificate request has now been successfully merged.
6868

6969
1. Create a certificate policy. Because the CA chosen in this scenario isn't partnered, **IssuerName** is set to **Unknown** and Key Vault doesn't enroll or renew the certificate.
7070

71-
```azure-powershell
71+
```azurepowershell
7272
$policy = New-AzKeyVaultCertificatePolicy -SubjectName "CN=www.contosoHRApp.com" -ValidityInMonths 1 -IssuerName Unknown
7373
```
7474
> [!NOTE]
@@ -80,7 +80,7 @@ The certificate request has now been successfully merged.
8080
8181
1. Create the CSR.
8282

83-
```azure-powershell
83+
```azurepowershell
8484
$csr = Add-AzKeyVaultCertificate -VaultName "<vault-name>" -Name "<certificate-name>" -CertificatePolicy $policy
8585
$csr.CertificateSigningRequest
8686
```
@@ -89,7 +89,7 @@ The certificate request has now been successfully merged.
8989

9090
1. Merge the signed request in Key Vault. After the certificate request has been signed, you can merge it with the initial private/public key pair created in Azure Key Vault.
9191

92-
```azure-powershell-interactive
92+
```azurepowershell-interactive
9393
Import-AzKeyVaultCertificate -VaultName "<vault-name>" -Name "<certificate-name>" -FilePath C:\test\OutputCertificateFile.cer
9494
```
9595
@@ -108,7 +108,7 @@ If you want to add more information when creating the CSR, define it in **Subjec
108108
109109
Example
110110
111-
```azure-powershell
111+
```azurepowershell
112112
SubjectName="CN = learn.microsoft.com, OU = Microsoft Corporation, O = Microsoft Corporation, L = Redmond, S = WA, C = US"
113113
```
114114

articles/key-vault/certificates/create-certificate.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -15,11 +15,11 @@ ms.author: mbaldwin
1515

1616
# Certificate creation methods
1717

18-
A Key Vault (KV) certificate can be either created or imported into a key vault. When a KV certificate is created, the private key is created inside the key vault and never exposed to certificate owner. The following are ways to create a certificate in Key Vault:
18+
A Key Vault certificate can be either created or imported into a key vault. When a Key Vault certificate is created, the private key is created inside the key vault and never exposed to the certificate owner. The following are ways to create a certificate in Key Vault:
1919

2020
- **Create a self-signed certificate:** Create a public-private key pair and associate it with a certificate. The certificate will be signed by its own key.
2121

22-
- **Create a new certificate manually:** Create a public-private key pair and generate an X.509 certificate signing request. The signing request can be signed by your registration authority or certification authority. The signed x509 certificate can be merged with the pending key pair to complete the KV certificate in Key Vault. Although this method requires more steps, it does provide you with greater security because the private key is created in and restricted to Key Vault.
22+
- **Create a new certificate manually:** Create a public-private key pair and generate an X.509 certificate signing request. The signing request can be signed by your registration authority or certification authority. The signed X.509 certificate can be merged with the pending key pair to complete the Key Vault certificate in Key Vault. Although this method requires more steps, it does provide you with greater security because the private key is created in and restricted to Key Vault.
2323

2424
![Create a certificate with your own certificate authority](../media/certificate-authority-1.png)
2525

@@ -31,29 +31,29 @@ The following descriptions correspond to the green lettered steps in the precedi
3131
4. Your chosen CA responds with an X509 Certificate.
3232
5. Your application completes the new certificate creation with a merger of the X509 Certificate from your CA.
3333

34-
- **Create a certificate with a known issuer provider:** This method requires you to do a one-time task of creating an issuer object. Once an issuer object is created in your key vault, its name can be referenced in the policy of the KV certificate. A request to create such a KV certificate will create a key pair in the vault and communicate with the issuer provider service using the information in the referenced issuer object to get an x509 certificate. The x509 certificate is retrieved from the issuer service and is merged with the key pair to complete the KV certificate creation.
34+
- **Create a certificate with a known issuer provider:** This method requires you to do a one-time task of creating an issuer object. Once an issuer object is created in your key vault, its name can be referenced in the policy of the Key Vault certificate. A request to create such a Key Vault certificate will create a key pair in the vault and communicate with the issuer provider service using the information in the referenced issuer object to get an X.509 certificate. The X.509 certificate is retrieved from the issuer service and is merged with the key pair to complete the Key Vault certificate creation.
3535

3636
![Create a certificate with a Key Vault partnered certificate authority](../media/certificate-authority-2.png)
3737

3838
The following descriptions correspond to the green lettered steps in the preceding diagram.
3939

4040
1. In the diagram, your application is creating a certificate, which internally begins by creating a key in your key vault.
4141
2. Key Vault sends a TLS/SSL Certificate Request to the CA.
42-
3. Your application polls, in a loop and wait process, for your Key Vault for certificate completion. The certificate creation is complete when Key Vault receives the CA’s response with x509 certificate.
42+
3. Your application polls, in a loop and wait process, for your Key Vault for certificate completion. The certificate creation is complete when Key Vault receives the CA’s response with an X.509 certificate.
4343
4. The CA responds to Key Vault's TLS/SSL Certificate Request with a TLS/SSL X.509 certificate.
4444
5. Your new certificate creation completes with the merger of the TLS/SSL X.509 certificate for the CA.
4545

4646
## Asynchronous process
4747

48-
KV certificate creation is an asynchronous process. This operation will create a KV certificate request and return an http status code of 202 (Accepted). The status of the request can be tracked by polling the pending object created by this operation. The full URI of the pending object is returned in the LOCATION header.
48+
Key Vault certificate creation is an asynchronous process. This operation creates a Key Vault certificate request and returns an HTTP status code of 202 (Accepted). The status of the request can be tracked by polling the pending object created by this operation. The full URI of the pending object is returned in the LOCATION header.
4949

50-
When a request to create a KV certificate completes, the status of the pending object will change to "completed" from "in progress", and a new version of the KV certificate will be created. This will become the current version.
50+
When a request to create a Key Vault certificate completes, the status of the pending object changes to "completed" from "in progress", and a new version of the Key Vault certificate is created. This becomes the current version.
5151

5252
## First creation
53-
When a KV certificate is created for the first time, an addressable key and secret are also created with the same name as the certificate. If the name is already in use, then the operation will fail with an http status code of 409 (conflict).
54-
The addressable key and secret get their attributes from the KV certificate attributes. The addressable key and secret created this way are marked as managed keys and secrets, whose lifetime is managed by Key Vault. Managed keys and secrets are read-only. Note: If a KV certificate expires or is disabled, the corresponding key and secret will become inoperable.
53+
When a Key Vault certificate is created for the first time, an addressable key and secret are also created with the same name as the certificate. If the name is already in use, then the operation fails with an HTTP status code of 409 (conflict).
54+
The addressable key and secret get their attributes from the Key Vault certificate attributes. The addressable key and secret created this way are marked as managed keys and secrets, whose lifetime is managed by Key Vault. Managed keys and secrets are read-only. Note: If a Key Vault certificate expires or is disabled, the corresponding key and secret become inoperable.
5555

56-
If this is the first operation to create a KV certificate, a policy is required. A policy can also be supplied with successive create operations to replace the policy resource. If a policy isn't supplied, then the policy resource on the service is used to create a next version of KV certificate. While a request to create a next version is in progress, the current KV certificate, and corresponding addressable key and secret, remain unchanged.
56+
If this is the first operation to create a Key Vault certificate, a policy is required. A policy can also be supplied with successive create operations to replace the policy resource. If a policy isn't supplied, then the policy resource on the service is used to create a next version of the Key Vault certificate. While a request to create a next version is in progress, the current Key Vault certificate, and corresponding addressable key and secret, remain unchanged.
5757

5858
## Self-issued certificate
5959
To create a self-issued certificate, set the issuer name as "Self" in the certificate policy as shown in following snippet from certificate policy.
@@ -65,7 +65,7 @@ When a request to create a KV certificate completes, the status of the pending o
6565
6666
```
6767

68-
If the issuer name isn't specified, then the issuer name is set to "Unknown". When issuer is "Unknown", the certificate owner will have to manually get a x509 certificate from the issuer of their choice, then merge the public x509 certificate with the key vault certificate pending object to complete the certificate creation.
68+
If the issuer name isn't specified, then the issuer name is set to "Unknown". When issuer is "Unknown", the certificate owner will have to manually get an X.509 certificate from the issuer of their choice, then merge the public X.509 certificate with the key vault certificate pending object to complete the certificate creation.
6969

7070
```
7171
"issuer": {
@@ -74,7 +74,7 @@ When a request to create a KV certificate completes, the status of the pending o
7474
7575
```
7676

77-
## Partnered CA Providers
77+
## Partnered CA providers
7878

7979
Certificate creation can be completed manually or using a "Self" issuer. Key Vault also partners with certain issuer providers to simplify the creation of certificates. The following types of certificates can be ordered for key vault with these partner issuer providers.
8080

@@ -83,9 +83,9 @@ Certificate creation can be completed manually or using a "Self" issuer. Key Vau
8383
|DigiCert|Key Vault offers OV or EV SSL certificates with DigiCert| [Integration Guide](./how-to-integrate-certificate-authority.md)
8484
|GlobalSign|Key Vault offers OV or EV SSL certificates with GlobalSign| [Integration Guide](https://support.globalsign.com/code-signing/Code-Signing-certificate-setup-in-Azure-Key-vault)
8585

86-
A certificate issuer is an entity represented in Azure Key Vault (KV) as a CertificateIssuer resource. It is used to provide information about the source of a KV certificate; issuer name, provider, credentials, and other administrative details.
86+
A certificate issuer is an entity represented in Azure Key Vault as a CertificateIssuer resource. It provides information about the source of a Key Vault certificate: issuer name, provider, credentials, and other administrative details.
8787

88-
When an order is placed with the issuer provider, it may honor or override the x509 certificate extensions and certificate validity period based on the type of certificate.
88+
When an order is placed with the issuer provider, it may honor or override the X.509 certificate extensions and certificate validity period based on the type of certificate.
8989

9090
Authorization: Requires the certificates/create permission.
9191

articles/key-vault/certificates/faq.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ sections:
6464
- question: |
6565
How can I resolve this error? "The specified PEM X.509 certificate content is in an unexpected format. Check if certificate is in valid PEM format."
6666
answer: |
67-
Verify that the content in the PEM file is uses UNIX-style line separators `(\n)`
67+
Verify that the content in the PEM file uses UNIX-style line separators `(\n)`
6868
- question: |
6969
Can I import an expired certificate to Azure Key Vault?
7070
answer: |
@@ -88,7 +88,7 @@ sections:
8888
- question: |
8989
How do I combine certificates in a single .PEM or .PFX file to have the whole certificate bundle imported to Key Vault?
9090
answer: |
91-
Certificate Authorities may provide with the option to either download certificate individually (root, intermediate, leaf) or download all of them in a single file. When you import certificates into Key Vault, Certificate Authorities allows you to import one or an entire whole chain.
91+
Certificate authorities may provide the option to either download certificates individually (root, intermediate, leaf) or download all of them in a single file. When you import certificates into Key Vault, certificate authorities allow you to import one or an entire chain.
9292
9393
- name: Renew your Azure Key Vault certificates
9494
questions:

articles/key-vault/certificates/overview-renew-certificate.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -62,11 +62,11 @@ To renew a nonintegrated CA certificate:
6262
3. On the **Create a certificate** page, make sure the **Generate** option is selected under **Method of Certificate Creation**.
6363
4. Verify the **Subject** and other details about the certificate and then select **Create**.
6464
5. You should now see the message **The creation of certificate `<certificate-name>` is currently pending. Click here to go its Certificate Operation to monitor the progress**
65-
1. Select on the message and a new pane should be shown. The pane should show the status as "In Progress". At this point, Key Vault has generated a CSR that you can download using the **Download CSR** option.
65+
1. Select the message and a new pane appears. The pane should show the status as "In Progress". At this point, Key Vault has generated a CSR that you can download using the **Download CSR** option.
6666
1. Select **Download CSR** to download a CSR file to your local drive.
6767
1. Send the CSR to your choice of CA to sign the request.
6868
1. Bring back the signed request, and select **Merge Signed Request** on the same certificate operation pane.
69-
10. The status after merging will show **Completed** and on the main certificate pane you can hit **Refresh** to see the new version of the certificate.
69+
10. The status after merging shows **Completed** and on the main certificate pane you can select **Refresh** to see the new version of the certificate.
7070

7171
# [Azure CLI](#tab/azure-cli)
7272

articles/key-vault/certificates/quick-create-java.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -189,7 +189,7 @@ CertificateClient certificateClient = new CertificateClientBuilder()
189189

190190
### Save a certificate
191191

192-
Now that your application is authenticated, you can create a certificate in your key vault using the `certificateClient.beginCreateCertificate` method. This requires a name for the certificate and a certificate policy -- we've assigned the value "myCertificate" to the `certificateName` variable in this sample and use a default policy.
192+
Now that your application is authenticated, you can create a certificate in your key vault using the `certificateClient.beginCreateCertificate` method. This requires a name for the certificate and a certificate policy -- the value "myCertificate" is assigned to the `certificateName` variable in this sample and a default policy is used.
193193

194194
Certificate creation is a long running operation, for which you can poll its progress or wait for it to complete.
195195

articles/key-vault/certificates/tutorial-rotate-certificates.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
2-
title: Tutorial - Updating certificate autorotation frequency in Key Vault | Microsoft Docs
2+
title: Tutorial - Updating certificate autorotation frequency in Key Vault
33
description: Tutorial showing how to update a certificate's autorotation frequency in Azure Key Vault using the Azure portal
44
services: key-vault
55
author: msmbaldwin
66
ms.service: azure-key-vault
77
ms.subservice: certificates
88
ms.topic: tutorial
99
ms.custom: mvc, sfi-image-nochange
10-
ms.date: 01/30/2026
10+
ms.date: 04/10/2026
1111

1212
ms.author: mbaldwin
1313
#Customer intent: As a security admin who is new to Azure, I want to use Key Vault to securely store certificates in Azure.

0 commit comments

Comments
 (0)