Skip to content

Commit c8910b9

Browse files
committed
Fix include files to use site-relative links
1 parent eda7214 commit c8910b9

5 files changed

Lines changed: 8 additions & 8 deletions

File tree

articles/key-vault/includes/key-management-policy-grammar.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -257,7 +257,7 @@ The encoding is as follows:
257257
An Environment Assertion is a signed assertion, in JSON Web Token form, from a trusted authority. An Environment Asserting contains at least a key encryption key and one or more claims about the target environment (for example, TEE type, publisher, version) that are matched against the Key Release Policy. The key encryption key is a public RSA key owned and protected by the target execution environment that is used for key export. It must appear in the TEE keys claim (x-ms-runtime/keys). This claim is a JSON object representing a JSON Web Key Set. Within the JWKS, one of the keys must meet the requirements for use as an encryption key (key_use is "enc", or key_ops contains "encrypt"). The first suitable key is chosen.
258258

259259
## Key Vault and Managed HSM Attestation Token Requirements
260-
Azure Key Vault Premium and Managed HSM Secure Key Release were designed alongside [Microsoft Azure Attestation Service](../../attestation/overview.md) but may work with any attestation servers tokens if it conforms to the expected token structure, supports OpenID connect, and has the expected claims. DigiCert is presently the only public CA that Azure Key Vault Premium and Managed HSM trust for attestation token signing certificates.
260+
Azure Key Vault Premium and Managed HSM Secure Key Release were designed alongside [Microsoft Azure Attestation Service](/azure/attestation/overview) but may work with any attestation server's tokens if it conforms to the expected token structure, supports OpenID connect, and has the expected claims. DigiCert is presently the only public CA that Azure Key Vault Premium and Managed HSM trust for attestation token signing certificates.
261261

262262

263263

@@ -279,4 +279,4 @@ The full set of requirements are:
279279

280280
- Marked with **key_use** of encryption or a **key_ops** array containing the Encrypt operation.
281281

282-
For a sample token see [Examples of an Azure Attestation token](../../attestation/attestation-token-examples.md#sample-jwt-generated-for-sev-snp-attestation).
282+
For a sample token see [Examples of an Azure Attestation token](/azure/attestation/attestation-token-examples#sample-jwt-generated-for-sev-snp-attestation).

articles/key-vault/includes/managed-hsm/cleanup-warning.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,4 +9,4 @@ ms.date: 03/13/2026
99
---
1010

1111
> [!WARNING]
12-
> Deleting the resource group puts the Managed HSM into a soft-deleted state. The Managed HSM continues to be billed until it is purged. See [Managed HSM soft-delete and purge protection](../../managed-hsm/recovery.md)
12+
> Deleting the resource group puts the Managed HSM into a soft-deleted state. The Managed HSM continues to be billed until it is purged. See [Managed HSM soft-delete and purge protection](/azure/key-vault/managed-hsm/recovery)

articles/key-vault/includes/managed-hsm/intro.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,4 +8,4 @@ ms.date: 03/13/2026
88
# Include: Managed HSM intro description
99
---
1010

11-
Managed HSM is a fully managed, highly available, single-tenant, standards-compliant cloud service that enables you to safeguard cryptographic keys for your cloud applications, using **FIPS 140-3 Level 3** validated HSMs. For more information on Managed HSM, review the [Overview](../../managed-hsm/overview.md).
11+
Managed HSM is a fully managed, highly available, single-tenant, standards-compliant cloud service that enables you to safeguard cryptographic keys for your cloud applications, using **FIPS 140-3 Level 3** validated HSMs. For more information on Managed HSM, review the [Overview](/azure/key-vault/managed-hsm/overview).

articles/key-vault/includes/managed-hsm/sdk-prereqs.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.date: 03/13/2026
99
---
1010

1111
- An Azure subscription. [Create one for free](https://azure.microsoft.com/free/).
12-
- A provisioned and activated Managed HSM. See [Quickstart: Provision and activate a managed HSM using Azure CLI](../../managed-hsm/quick-create-cli.md).
13-
- A key created in your Managed HSM. See [Manage keys in a Managed HSM](../../managed-hsm/key-management.md).
12+
- A provisioned and activated Managed HSM. See [Quickstart: Provision and activate a managed HSM using Azure CLI](/azure/key-vault/managed-hsm/quick-create-cli).
13+
- A key created in your Managed HSM. See [Manage keys in a Managed HSM](/azure/key-vault/managed-hsm/key-management).
1414
- An Azure resource with a managed identity (such as a VM, App Service, or Azure Function) or Azure CLI for local development.
15-
- The managed identity must have the appropriate Managed HSM local RBAC role assigned. See [Secure access to your managed HSMs](../../managed-hsm/how-to-secure-access.md).
15+
- The managed identity must have the appropriate Managed HSM local RBAC role assigned. See [Secure access to your managed HSMs](/azure/key-vault/managed-hsm/how-to-secure-access).

articles/key-vault/includes/managed-hsm/sdk-role-assignment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,4 +24,4 @@ az keyvault role assignment create \
2424
--scope /keys
2525
```
2626

27-
For more information on roles and permissions, see [Managed HSM local RBAC built-in roles](../../managed-hsm/built-in-roles.md).
27+
For more information on roles and permissions, see [Managed HSM local RBAC built-in roles](/azure/key-vault/managed-hsm/built-in-roles).

0 commit comments

Comments
 (0)