Skip to content

Commit c5bbda6

Browse files
msmbaldwinCopilot
andcommitted
Audit key-vault/certificates docset: fix links, style, grammar
- Fix broken PowerShell docs link in overview-renew-certificate.md - Fix incorrect CLI anchor for list-versions command - Fix 'Save a secret' heading → 'Save a certificate' in Java quickstart - Normalize [!Note] → [!NOTE] across multiple files - Remove legacy '| Microsoft Docs' from title fields - Replace 'Click' with 'Select' per MS style guide - Fix grammar: 'an TLS' → 'a TLS', subject-verb agreement - Rename 'See Also' → 'Next steps' in create-certificate.md - Fix heading casing in certificate-scenarios.md - Update stale faq.yml (ms.date from 2022) and modernize RBAC guidance - Remove deprecated tags: field from front matter - Fix escaped quotes in PowerShell quickstart code block - Remove 'Applies To: Azure' from create-certificate-scenarios.md - Update ms.date on all modified files Co-authored-by: Copilot <[email protected]>
1 parent ffc0c5d commit c5bbda6

12 files changed

Lines changed: 38 additions & 41 deletions

articles/key-vault/certificates/about-certificates.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: msmbaldwin
77
ms.service: azure-key-vault
88
ms.subservice: certificates
99
ms.topic: overview
10-
ms.date: 04/14/2025
10+
ms.date: 04/10/2026
1111

1212
ms.author: mbaldwin
1313
ms.custom: sfi-image-nochange
@@ -23,7 +23,7 @@ Azure Key Vault certificate support provides for management of your X.509 certif
2323
- Allows a certificate owner to provide contact information for notifications about the lifecycle events of expiration and renewal.
2424
- Supports automatic renewal with selected issuers: Key Vault partner X.509 certificate providers and CAs.
2525

26-
> [!Note]
26+
> [!NOTE]
2727
> Non-partnered providers and authorities are also allowed but don't support automatic renewal.
2828
2929
For details on certificate creation, see [Certificate creation methods](create-certificate.md).
@@ -65,14 +65,14 @@ A response includes these additional read-only attributes:
6565
- `exp`: `IntDate` contains the value of the expiration date of the X.509 certificate.
6666
- `nbf`: `IntDate` contains the value of the "not before" date of the X.509 certificate.
6767

68-
> [!Note]
68+
> [!NOTE]
6969
> If a Key Vault certificate expires it can still be retrieved, but certificate may become inoperable in scenarios like TLS protection where expiration of certificate is validated.
7070
7171
### Tags
7272

7373
Tags for certificates are a client-specified dictionary of key/value pairs, much like tags in keys and secrets.
7474

75-
> [!Note]
75+
> [!NOTE]
7676
> A caller can read tags if they have the *list* or *get* permission to that object type (keys, secrets, or certificates).
7777
7878
## Certificate policy
@@ -136,7 +136,7 @@ Key Vault allows for the creation of multiple issuer objects with different issu
136136

137137
Issuer objects are created in the vault. They can be used only with Key Vault certificates in the same vault.
138138

139-
>[!Note]
139+
>[!NOTE]
140140
>Publicly trusted certificates are sent to CAs and certificate transparency (CT) logs outside the Azure boundary during enrollment. They're covered by the GDPR policies of those entities.
141141
142142
## Certificate contacts

articles/key-vault/certificates/certificate-scenarios.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: msmbaldwin
66
ms.service: azure-key-vault
77
ms.subservice: certificates
88
ms.topic: get-started
9-
ms.date: 01/30/2026
9+
ms.date: 04/10/2026
1010

1111
ms.author: mbaldwin
1212
ms.custom: sfi-image-nochange
@@ -58,7 +58,7 @@ Note - This process, through **Step 3b**, is a onetime operation.
5858

5959
**Step 4:** The following descriptions correspond to the green numbered steps in the preceding diagram.
6060
(1) - In the diagram above, your application is creating a certificate which internally begins by creating a key in your key vault.
61-
(2) - Key Vault sends an TLS/SSL Certificate Request to the CA.
61+
(2) - Key Vault sends a TLS/SSL Certificate Request to the CA.
6262
(3) - Your application polls, in a loop and wait process, for your Key Vault for certificate completion. The certificate creation is complete when Key Vault receives the CA’s response with x509 certificate.
6363
(4) - The CA responds to Key Vault's TLS/SSL Certificate Request with an X509 TLS/SSL Certificate.
6464
(5) - Your new certificate creation completes with the merger of the X509 Certificate for the CA.
@@ -94,7 +94,7 @@ Key Vault service sends requests to CA (outbound traffic). Therefore, it’s ful
9494

9595
- Also, the user can edit the policy, which is functional at the time of import but contains defaults where no information was specified at import. For example, no issuer info
9696

97-
### Formats of Import we support
97+
### Formats of import we support
9898
Azure Key Vault supports .pem and .pfx certificate files for importing Certificates into Key vault.
9999
We support the following type of Import for PEM file format. A single PEM encoded certificate along with a PKCS#8 encoded, unencrypted key which has the following format:
100100

@@ -109,18 +109,18 @@ We support the following type of Import for PEM file format. A single PEM encode
109109
When you are importing the certificate, you need to ensure that the key is included in the file itself. If you have the private key separately in a different format, you would need to combine the key with the certificate. Some certificate authorities provide certificates in different formats, therefore before importing the certificate, make sure that they are either in .pem or .pfx format.
110110

111111

112-
>[!Note]
112+
>[!NOTE]
113113
>Ensure that no other meta data is present in the certificate file and that the private key not showing as encrypted.
114114
115-
### Formats of Merge CSR we support
115+
### Formats of merge CSR we support
116116

117117
Azure Key Vault supports PKCS#8 encoded certificate with below headers:
118118

119119
-----BEGIN CERTIFICATE-----
120120

121121
-----END CERTIFICATE-----
122122

123-
>[!Note]
123+
>[!NOTE]
124124
> P7B (PKCS#7) signed certificates chain, commonly used by Certificate Authorities (CAs), is supported as long as is base64 encoded. You may use [certutil -encode](/windows-server/administration/windows-commands/certutil#-encode) to convert to supported format.
125125
126126
## Creating a certificate with a CA not partnered with Key Vault

articles/key-vault/certificates/create-certificate-scenarios.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,6 @@ ms.author: mbaldwin
1414
---
1515

1616
# Monitor and manage certificate creation
17-
Applies To: Azure
1817

1918
The scenarios / operations outlined in this article are:
2019

articles/key-vault/certificates/create-certificate.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: msmbaldwin
77
ms.service: azure-key-vault
88
ms.subservice: certificates
99
ms.topic: concept-article
10-
ms.date: 04/14/2025
10+
ms.date: 04/10/2026
1111

1212
ms.author: mbaldwin
1313

@@ -38,9 +38,9 @@ The following descriptions correspond to the green lettered steps in the precedi
3838
The following descriptions correspond to the green lettered steps in the preceding diagram.
3939

4040
1. In the diagram, your application is creating a certificate, which internally begins by creating a key in your key vault.
41-
2. Key Vault sends an TLS/SSL Certificate Request to the CA.
41+
2. Key Vault sends a TLS/SSL Certificate Request to the CA.
4242
3. Your application polls, in a loop and wait process, for your Key Vault for certificate completion. The certificate creation is complete when Key Vault receives the CA’s response with x509 certificate.
43-
4. The CA responds to Key Vault's TLS/SSL Certificate Request with an TLS/SSL X.509 certificate.
43+
4. The CA responds to Key Vault's TLS/SSL Certificate Request with a TLS/SSL X.509 certificate.
4444
5. Your new certificate creation completes with the merger of the TLS/SSL X.509 certificate for the CA.
4545

4646
## Asynchronous process
@@ -50,7 +50,7 @@ KV certificate creation is an asynchronous process. This operation will create a
5050
When a request to create a KV certificate completes, the status of the pending object will change to "completed" from "in progress", and a new version of the KV certificate will be created. This will become the current version.
5151

5252
## First creation
53-
When a KV certificate is created for the first time, an addressable key and secret is also created with the same name as the certificate. If the name is already in use, then the operation will fail with an http status code of 409 (conflict).
53+
When a KV certificate is created for the first time, an addressable key and secret are also created with the same name as the certificate. If the name is already in use, then the operation will fail with an http status code of 409 (conflict).
5454
The addressable key and secret get their attributes from the KV certificate attributes. The addressable key and secret created this way are marked as managed keys and secrets, whose lifetime is managed by Key Vault. Managed keys and secrets are read-only. Note: If a KV certificate expires or is disabled, the corresponding key and secret will become inoperable.
5555

5656
If this is the first operation to create a KV certificate, a policy is required. A policy can also be supplied with successive create operations to replace the policy resource. If a policy isn't supplied, then the policy resource on the service is used to create a next version of KV certificate. While a request to create a next version is in progress, the current KV certificate, and corresponding addressable key and secret, remain unchanged.
@@ -89,7 +89,7 @@ When an order is placed with the issuer provider, it may honor or override the x
8989

9090
Authorization: Requires the certificates/create permission.
9191

92-
## See Also
92+
## Next steps
9393

9494
- How-to guide to create certificates in Key Vault using [Portal](./quick-create-portal.md), [Azure CLI](./quick-create-cli.md), [Azure PowerShell](./quick-create-powershell.md)
9595
- [Monitor and manage certificate creation](create-certificate-scenarios.md)

articles/key-vault/certificates/faq.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ metadata:
88
ms.service: azure-key-vault
99
ms.subservice: certificates
1010
ms.topic: overview
11-
ms.date: 05/25/2022
11+
ms.date: 04/10/2026
1212
ms.author: mbaldwin
1313
title: Importing Azure Key Vault certificates FAQ
1414
summary: This article answers frequently asked questions about Azure Key Vault certificates.
@@ -46,9 +46,9 @@ sections:
4646
- question: |
4747
How can I resolve this error? "Error type: Access denied or user is unauthorized to import certificate"
4848
answer: |
49-
The import operation requires that you grant the user permissions to import the certificate under the access policies. To do so, go to your key vault, select **Access policies** > **Add Access Policy** > **Select Certificate Permissions** > **Principal**, search for the user, and then add the user's email address.
49+
The import operation requires that you grant the user permissions to import the certificate. If you're using Azure RBAC (recommended), assign the **Key Vault Certificates Officer** role to the user. If you're using access policies (legacy), go to your key vault, select **Access policies** > **Add Access Policy** > **Select Certificate Permissions** > **Principal**, search for the user, and then add the user's email address.
5050
51-
For more information about certificate-related access policies, see [About Azure Key Vault certificates](./about-certificates.md#certificate-access-control).
51+
For more information about certificate-related access control, see [About Azure Key Vault certificates](./about-certificates.md#certificate-access-control).
5252
- question: |
5353
How can I resolve this error? "Error type: Conflict when creating a certificate"
5454
answer: |

articles/key-vault/certificates/how-to-export-certificate.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,6 @@ title: Export certificates from Azure Key Vault
33
description: Learn how to export certificates from Azure Key Vault.
44
services: key-vault
55
author: msmbaldwin
6-
tags: azure-key-vault
76

87
ms.service: azure-key-vault
98
ms.subservice: certificates

articles/key-vault/certificates/overview-renew-certificate.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: msmbaldwin
77
ms.service: azure-key-vault
88
ms.subservice: certificates
99
ms.topic: overview
10-
ms.date: 03/26/2026
10+
ms.date: 04/10/2026
1111

1212
ms.author: mbaldwin
1313
---
@@ -76,7 +76,7 @@ Use the Azure CLI [az keyvault certificate create](/cli/azure/keyvault/certifica
7676
az keyvault certificate create --vault-name "<vault-name>" -n "<certificate-name>" -p "$(az keyvault certificate get-default-policy)"
7777
```
7878

79-
After renewing the certificate, you can view all the versions of the certificate using the Azure CLI [az keyvault certificate list-versions](/cli/azure/keyvault/certificate#az-keyvault-certificate-list) command:
79+
After renewing the certificate, you can view all the versions of the certificate using the Azure CLI [az keyvault certificate list-versions](/cli/azure/keyvault/certificate#az-keyvault-certificate-list-versions) command:
8080

8181
```azurecli-interactive
8282
az keyvault certificate list-versions --vault-name "<vault-name>" -n "<certificate-name>"
@@ -92,7 +92,7 @@ $Policy = New-AzKeyVaultCertificatePolicy -SecretContentType "application/x-pkcs
9292
Add-AzKeyVaultCertificate -VaultName "<vault-name>" -Name "<certificate-name>" -CertificatePolicy $Policy
9393
```
9494

95-
After renewing the certificate, you can view all the versions of the certificate using the Azure PowerShell [Get-AzKeyVaultCertificate](/cli/azure/keyvault/certificate#az-keyvault-certificate-list) cmdlet:
95+
After renewing the certificate, you can view all the versions of the certificate using the Azure PowerShell [Get-AzKeyVaultCertificate](/powershell/module/az.keyvault/get-azkeyvaultcertificate) cmdlet:
9696

9797
```azurepowershell-interactive
9898
Get-AzKeyVaultCertificate "<vault-name>" -Name "<certificate-name>" -IncludeVersions

articles/key-vault/certificates/quick-create-java.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn about the Azure Key Vault Certificate client library for Java
44
author: msmbaldwin
55
ms.custom: devx-track-java, devx-track-azurecli, devx-track-azurepowershell, mode-api, passwordless-java, devx-track-extended-java
66
ms.author: mbaldwin
7-
ms.date: 03/30/2026
7+
ms.date: 04/10/2026
88

99
ms.service: azure-key-vault
1010
ms.subservice: certificates
@@ -187,7 +187,7 @@ CertificateClient certificateClient = new CertificateClientBuilder()
187187
.buildClient();
188188
```
189189

190-
### Save a secret
190+
### Save a certificate
191191

192192
Now that your application is authenticated, you can create a certificate in your key vault using the `certificateClient.beginCreateCertificate` method. This requires a name for the certificate and a certificate policy -- we've assigned the value "myCertificate" to the `certificateName` variable in this sample and use a default policy.
193193

articles/key-vault/certificates/quick-create-portal.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
2-
title: Azure Quickstart - Set and retrieve a certificate from Key Vault using Azure portal | Microsoft Docs
2+
title: Azure Quickstart - Set and retrieve a certificate from Key Vault using Azure portal
33
description: Quickstart showing how to set and retrieve a certificate from Azure Key Vault using the Azure portal
44
services: key-vault
55
author: msmbaldwin
66
ms.service: azure-key-vault
77
ms.subservice: certificates
88
ms.topic: quickstart
99
ms.custom: mvc, mode-ui, sfi-image-nochange
10-
ms.date: 01/30/2026
10+
ms.date: 04/10/2026
1111

1212
ms.author: mbaldwin
1313
#Customer intent: As a security admin who is new to Azure, I want to use Key Vault to securely store certificates in Azure
@@ -28,24 +28,24 @@ Sign in to the [Azure portal](https://portal.azure.com).
2828

2929
## Add a certificate to Key Vault
3030

31-
To add a certificate to the vault, you just need to take a couple of additional steps. In this case, we add a self-signed certificate that could be used by an application. The certificate is called **ExampleCertificate**.
31+
To add a certificate to the vault, you just need to take a couple of additional steps. In this case, you add a self-signed certificate that could be used by an application. The certificate is called **ExampleCertificate**.
3232

3333
1. On the Key Vault properties pages, select **Certificates**.
34-
2. Click on **Generate/Import**.
34+
2. Select **Generate/Import**.
3535
3. On the **Create a certificate** screen choose the following values:
3636
- **Method of Certificate Creation**: Generate.
3737
- **Certificate Name**: ExampleCertificate.
3838
- **Subject**: CN=ExampleDomain
3939
- Leave the other values to their defaults. (By default, if you don't specify anything special in Advanced policy, it'll be usable as a client auth certificate.)
40-
4. Click **Create**.
40+
4. Select **Create**.
4141

42-
Once you receive the message that the certificate has been successfully created, you may click on it on the list. You can then see some of the properties. If you click on the current version, you can see the value you specified in the previous step.
42+
Once you receive the message that the certificate has been successfully created, you can select it on the list. You can then see some of the properties. If you select the current version, you can see the value you specified in the previous step.
4343

4444
![Certificate properties](../media/certificates/quick-create-portal/current-version-hidden.png)
4545

4646
## Export certificate from Key Vault
4747

48-
By clicking "Download in CER format" or "Download in PFX/PEM format" button, you can download the certificate.
48+
By selecting **Download in CER format** or **Download in PFX/PEM format** button, you can download the certificate.
4949

5050
![Certificate download](../media/certificates/quick-create-portal/current-version-shown.png)
5151

articles/key-vault/certificates/quick-create-powershell.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: azure-key-vault
77
ms.subservice: certificates
88
ms.topic: quickstart
99
ms.custom: mvc, devx-track-azurepowershell, mode-api
10-
ms.date: 03/26/2026
10+
ms.date: 04/10/2026
1111
ms.author: mbaldwin
1212
#Customer intent: As a security admin who is new to Azure, I want to use Key Vault to securely store keys and passwords in Azure
1313
---
@@ -40,7 +40,7 @@ You can now add a certificate to the vault. This certificate could be used by an
4040
Use these commands to create a self-signed certificate with policy called **ExampleCertificate** :
4141

4242
```azurepowershell-interactive
43-
$Policy = New-AzKeyVaultCertificatePolicy -SecretContentType \"application/x-pkcs12\" -SubjectName \"CN=<domain-name>\" -IssuerName \"Self\" -ValidityInMonths 6 -ReuseKeyOnRenewal
43+
$Policy = New-AzKeyVaultCertificatePolicy -SecretContentType "application/x-pkcs12" -SubjectName "CN=<domain-name>" -IssuerName "Self" -ValidityInMonths 6 -ReuseKeyOnRenewal
4444
4545
Add-AzKeyVaultCertificate -VaultName "<vault-name>" -Name "ExampleCertificate" -CertificatePolicy $Policy
4646
```

0 commit comments

Comments
 (0)