You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Fix broken PowerShell docs link in overview-renew-certificate.md
- Fix incorrect CLI anchor for list-versions command
- Fix 'Save a secret' heading → 'Save a certificate' in Java quickstart
- Normalize [!Note] → [!NOTE] across multiple files
- Remove legacy '| Microsoft Docs' from title fields
- Replace 'Click' with 'Select' per MS style guide
- Fix grammar: 'an TLS' → 'a TLS', subject-verb agreement
- Rename 'See Also' → 'Next steps' in create-certificate.md
- Fix heading casing in certificate-scenarios.md
- Update stale faq.yml (ms.date from 2022) and modernize RBAC guidance
- Remove deprecated tags: field from front matter
- Fix escaped quotes in PowerShell quickstart code block
- Remove 'Applies To: Azure' from create-certificate-scenarios.md
- Update ms.date on all modified files
Co-authored-by: Copilot <[email protected]>
Copy file name to clipboardExpand all lines: articles/key-vault/certificates/about-certificates.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ author: msmbaldwin
7
7
ms.service: azure-key-vault
8
8
ms.subservice: certificates
9
9
ms.topic: overview
10
-
ms.date: 04/14/2025
10
+
ms.date: 04/10/2026
11
11
12
12
ms.author: mbaldwin
13
13
ms.custom: sfi-image-nochange
@@ -23,7 +23,7 @@ Azure Key Vault certificate support provides for management of your X.509 certif
23
23
- Allows a certificate owner to provide contact information for notifications about the lifecycle events of expiration and renewal.
24
24
- Supports automatic renewal with selected issuers: Key Vault partner X.509 certificate providers and CAs.
25
25
26
-
> [!Note]
26
+
> [!NOTE]
27
27
> Non-partnered providers and authorities are also allowed but don't support automatic renewal.
28
28
29
29
For details on certificate creation, see [Certificate creation methods](create-certificate.md).
@@ -65,14 +65,14 @@ A response includes these additional read-only attributes:
65
65
-`exp`: `IntDate` contains the value of the expiration date of the X.509 certificate.
66
66
-`nbf`: `IntDate` contains the value of the "not before" date of the X.509 certificate.
67
67
68
-
> [!Note]
68
+
> [!NOTE]
69
69
> If a Key Vault certificate expires it can still be retrieved, but certificate may become inoperable in scenarios like TLS protection where expiration of certificate is validated.
70
70
71
71
### Tags
72
72
73
73
Tags for certificates are a client-specified dictionary of key/value pairs, much like tags in keys and secrets.
74
74
75
-
> [!Note]
75
+
> [!NOTE]
76
76
> A caller can read tags if they have the *list* or *get* permission to that object type (keys, secrets, or certificates).
77
77
78
78
## Certificate policy
@@ -136,7 +136,7 @@ Key Vault allows for the creation of multiple issuer objects with different issu
136
136
137
137
Issuer objects are created in the vault. They can be used only with Key Vault certificates in the same vault.
138
138
139
-
>[!Note]
139
+
>[!NOTE]
140
140
>Publicly trusted certificates are sent to CAs and certificate transparency (CT) logs outside the Azure boundary during enrollment. They're covered by the GDPR policies of those entities.
Copy file name to clipboardExpand all lines: articles/key-vault/certificates/certificate-scenarios.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: msmbaldwin
6
6
ms.service: azure-key-vault
7
7
ms.subservice: certificates
8
8
ms.topic: get-started
9
-
ms.date: 01/30/2026
9
+
ms.date: 04/10/2026
10
10
11
11
ms.author: mbaldwin
12
12
ms.custom: sfi-image-nochange
@@ -58,7 +58,7 @@ Note - This process, through **Step 3b**, is a onetime operation.
58
58
59
59
**Step 4:** The following descriptions correspond to the green numbered steps in the preceding diagram.
60
60
(1) - In the diagram above, your application is creating a certificate which internally begins by creating a key in your key vault.
61
-
(2) - Key Vault sends an TLS/SSL Certificate Request to the CA.
61
+
(2) - Key Vault sends a TLS/SSL Certificate Request to the CA.
62
62
(3) - Your application polls, in a loop and wait process, for your Key Vault for certificate completion. The certificate creation is complete when Key Vault receives the CA’s response with x509 certificate.
63
63
(4) - The CA responds to Key Vault's TLS/SSL Certificate Request with an X509 TLS/SSL Certificate.
64
64
(5) - Your new certificate creation completes with the merger of the X509 Certificate for the CA.
@@ -94,7 +94,7 @@ Key Vault service sends requests to CA (outbound traffic). Therefore, it’s ful
94
94
95
95
- Also, the user can edit the policy, which is functional at the time of import but contains defaults where no information was specified at import. For example, no issuer info
96
96
97
-
### Formats of Import we support
97
+
### Formats of import we support
98
98
Azure Key Vault supports .pem and .pfx certificate files for importing Certificates into Key vault.
99
99
We support the following type of Import for PEM file format. A single PEM encoded certificate along with a PKCS#8 encoded, unencrypted key which has the following format:
100
100
@@ -109,18 +109,18 @@ We support the following type of Import for PEM file format. A single PEM encode
109
109
When you are importing the certificate, you need to ensure that the key is included in the file itself. If you have the private key separately in a different format, you would need to combine the key with the certificate. Some certificate authorities provide certificates in different formats, therefore before importing the certificate, make sure that they are either in .pem or .pfx format.
110
110
111
111
112
-
>[!Note]
112
+
>[!NOTE]
113
113
>Ensure that no other meta data is present in the certificate file and that the private key not showing as encrypted.
114
114
115
-
### Formats of Merge CSR we support
115
+
### Formats of merge CSR we support
116
116
117
117
Azure Key Vault supports PKCS#8 encoded certificate with below headers:
118
118
119
119
-----BEGIN CERTIFICATE-----
120
120
121
121
-----END CERTIFICATE-----
122
122
123
-
>[!Note]
123
+
>[!NOTE]
124
124
> P7B (PKCS#7) signed certificates chain, commonly used by Certificate Authorities (CAs), is supported as long as is base64 encoded. You may use [certutil -encode](/windows-server/administration/windows-commands/certutil#-encode) to convert to supported format.
125
125
126
126
## Creating a certificate with a CA not partnered with Key Vault
Copy file name to clipboardExpand all lines: articles/key-vault/certificates/create-certificate.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ author: msmbaldwin
7
7
ms.service: azure-key-vault
8
8
ms.subservice: certificates
9
9
ms.topic: concept-article
10
-
ms.date: 04/14/2025
10
+
ms.date: 04/10/2026
11
11
12
12
ms.author: mbaldwin
13
13
@@ -38,9 +38,9 @@ The following descriptions correspond to the green lettered steps in the precedi
38
38
The following descriptions correspond to the green lettered steps in the preceding diagram.
39
39
40
40
1. In the diagram, your application is creating a certificate, which internally begins by creating a key in your key vault.
41
-
2. Key Vault sends an TLS/SSL Certificate Request to the CA.
41
+
2. Key Vault sends a TLS/SSL Certificate Request to the CA.
42
42
3. Your application polls, in a loop and wait process, for your Key Vault for certificate completion. The certificate creation is complete when Key Vault receives the CA’s response with x509 certificate.
43
-
4. The CA responds to Key Vault's TLS/SSL Certificate Request with an TLS/SSL X.509 certificate.
43
+
4. The CA responds to Key Vault's TLS/SSL Certificate Request with a TLS/SSL X.509 certificate.
44
44
5. Your new certificate creation completes with the merger of the TLS/SSL X.509 certificate for the CA.
45
45
46
46
## Asynchronous process
@@ -50,7 +50,7 @@ KV certificate creation is an asynchronous process. This operation will create a
50
50
When a request to create a KV certificate completes, the status of the pending object will change to "completed" from "in progress", and a new version of the KV certificate will be created. This will become the current version.
51
51
52
52
## First creation
53
-
When a KV certificate is created for the first time, an addressable key and secret is also created with the same name as the certificate. If the name is already in use, then the operation will fail with an http status code of 409 (conflict).
53
+
When a KV certificate is created for the first time, an addressable key and secret are also created with the same name as the certificate. If the name is already in use, then the operation will fail with an http status code of 409 (conflict).
54
54
The addressable key and secret get their attributes from the KV certificate attributes. The addressable key and secret created this way are marked as managed keys and secrets, whose lifetime is managed by Key Vault. Managed keys and secrets are read-only. Note: If a KV certificate expires or is disabled, the corresponding key and secret will become inoperable.
55
55
56
56
If this is the first operation to create a KV certificate, a policy is required. A policy can also be supplied with successive create operations to replace the policy resource. If a policy isn't supplied, then the policy resource on the service is used to create a next version of KV certificate. While a request to create a next version is in progress, the current KV certificate, and corresponding addressable key and secret, remain unchanged.
@@ -89,7 +89,7 @@ When an order is placed with the issuer provider, it may honor or override the x
89
89
90
90
Authorization: Requires the certificates/create permission.
91
91
92
-
## See Also
92
+
## Next steps
93
93
94
94
- How-to guide to create certificates in Key Vault using [Portal](./quick-create-portal.md), [Azure CLI](./quick-create-cli.md), [Azure PowerShell](./quick-create-powershell.md)
95
95
-[Monitor and manage certificate creation](create-certificate-scenarios.md)
Copy file name to clipboardExpand all lines: articles/key-vault/certificates/faq.yml
+3-3Lines changed: 3 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ metadata:
8
8
ms.service: azure-key-vault
9
9
ms.subservice: certificates
10
10
ms.topic: overview
11
-
ms.date: 05/25/2022
11
+
ms.date: 04/10/2026
12
12
ms.author: mbaldwin
13
13
title: Importing Azure Key Vault certificates FAQ
14
14
summary: This article answers frequently asked questions about Azure Key Vault certificates.
@@ -46,9 +46,9 @@ sections:
46
46
- question: |
47
47
How can I resolve this error? "Error type: Access denied or user is unauthorized to import certificate"
48
48
answer: |
49
-
The import operation requires that you grant the user permissions to import the certificate under the access policies. To do so, go to your key vault, select **Access policies** > **Add Access Policy** > **Select Certificate Permissions** > **Principal**, search for the user, and then add the user's email address.
49
+
The import operation requires that you grant the user permissions to import the certificate. If you're using Azure RBAC (recommended), assign the **Key Vault Certificates Officer** role to the user. If you're using access policies (legacy), go to your key vault, select **Access policies** > **Add Access Policy** > **Select Certificate Permissions** > **Principal**, search for the user, and then add the user's email address.
50
50
51
-
For more information about certificate-related access policies, see [About Azure Key Vault certificates](./about-certificates.md#certificate-access-control).
51
+
For more information about certificate-related access control, see [About Azure Key Vault certificates](./about-certificates.md#certificate-access-control).
52
52
- question: |
53
53
How can I resolve this error? "Error type: Conflict when creating a certificate"
After renewing the certificate, you can view all the versions of the certificate using the Azure CLI [az keyvault certificate list-versions](/cli/azure/keyvault/certificate#az-keyvault-certificate-list) command:
79
+
After renewing the certificate, you can view all the versions of the certificate using the Azure CLI [az keyvault certificate list-versions](/cli/azure/keyvault/certificate#az-keyvault-certificate-list-versions) command:
80
80
81
81
```azurecli-interactive
82
82
az keyvault certificate list-versions --vault-name "<vault-name>" -n "<certificate-name>"
After renewing the certificate, you can view all the versions of the certificate using the Azure PowerShell [Get-AzKeyVaultCertificate](/cli/azure/keyvault/certificate#az-keyvault-certificate-list) cmdlet:
95
+
After renewing the certificate, you can view all the versions of the certificate using the Azure PowerShell [Get-AzKeyVaultCertificate](/powershell/module/az.keyvault/get-azkeyvaultcertificate) cmdlet:
@@ -187,7 +187,7 @@ CertificateClient certificateClient = new CertificateClientBuilder()
187
187
.buildClient();
188
188
```
189
189
190
-
### Save a secret
190
+
### Save a certificate
191
191
192
192
Now that your application is authenticated, you can create a certificate in your key vault using the `certificateClient.beginCreateCertificate` method. This requires a name for the certificate and a certificate policy -- we've assigned the value "myCertificate" to the `certificateName` variable in this sample and use a default policy.
Copy file name to clipboardExpand all lines: articles/key-vault/certificates/quick-create-portal.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,13 +1,13 @@
1
1
---
2
-
title: Azure Quickstart - Set and retrieve a certificate from Key Vault using Azure portal | Microsoft Docs
2
+
title: Azure Quickstart - Set and retrieve a certificate from Key Vault using Azure portal
3
3
description: Quickstart showing how to set and retrieve a certificate from Azure Key Vault using the Azure portal
4
4
services: key-vault
5
5
author: msmbaldwin
6
6
ms.service: azure-key-vault
7
7
ms.subservice: certificates
8
8
ms.topic: quickstart
9
9
ms.custom: mvc, mode-ui, sfi-image-nochange
10
-
ms.date: 01/30/2026
10
+
ms.date: 04/10/2026
11
11
12
12
ms.author: mbaldwin
13
13
#Customer intent: As a security admin who is new to Azure, I want to use Key Vault to securely store certificates in Azure
@@ -28,24 +28,24 @@ Sign in to the [Azure portal](https://portal.azure.com).
28
28
29
29
## Add a certificate to Key Vault
30
30
31
-
To add a certificate to the vault, you just need to take a couple of additional steps. In this case, we add a self-signed certificate that could be used by an application. The certificate is called **ExampleCertificate**.
31
+
To add a certificate to the vault, you just need to take a couple of additional steps. In this case, you add a self-signed certificate that could be used by an application. The certificate is called **ExampleCertificate**.
32
32
33
33
1. On the Key Vault properties pages, select **Certificates**.
34
-
2.Click on**Generate/Import**.
34
+
2.Select**Generate/Import**.
35
35
3. On the **Create a certificate** screen choose the following values:
36
36
-**Method of Certificate Creation**: Generate.
37
37
-**Certificate Name**: ExampleCertificate.
38
38
-**Subject**: CN=ExampleDomain
39
39
- Leave the other values to their defaults. (By default, if you don't specify anything special in Advanced policy, it'll be usable as a client auth certificate.)
40
-
4.Click**Create**.
40
+
4.Select**Create**.
41
41
42
-
Once you receive the message that the certificate has been successfully created, you may click on it on the list. You can then see some of the properties. If you click on the current version, you can see the value you specified in the previous step.
42
+
Once you receive the message that the certificate has been successfully created, you can select it on the list. You can then see some of the properties. If you select the current version, you can see the value you specified in the previous step.
0 commit comments