Skip to content

Commit c9b4bfc

Browse files
committed
Strengthen SDK guidance in Key Vault RBAC migration article
1 parent 72dda26 commit c9b4bfc

1 file changed

Lines changed: 5 additions & 5 deletions

File tree

articles/key-vault/general/access-control-default.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: mbaldwin
66
ms.service: azure-key-vault
77
ms.subservice: general
88
ms.topic: how-to
9-
ms.date: 03/26/2026
9+
ms.date: 04/02/2026
1010
ms.custom: devx-track-azurepowershell, devx-track-azurecli, sfi-image-nochange
1111

1212
#customer intent: As an Azure Key Vault administrator, I want to migrate from access policies to Azure RBAC so that I can improve security and simplify access management.
@@ -27,7 +27,7 @@ Azure Key Vault API version 2026-02-01 and later change the default access contr
2727
>
2828
> Note that Azure Cloud Shell always uses the latest API version. If you have scripts that run in Cloud Shell, ensure they are compatible with API version 2026-02-01 or later.
2929
>
30-
> Control plane management SDKs supporting API version 2026-02-01 are available for all languages. For package details, see [What's new for Azure Key Vault](whats-new.md#control-plane-sdk-releases).
30+
> **SDK impact**: Control plane management SDKs that use older API versions will stop working after the retirement date. Upgrade to SDK versions that support API version 2026-02-01 or later. For package details, see [What's new for Azure Key Vault](whats-new.md#control-plane-sdk-releases).
3131
3232
We encourage you to migrate key vaults that currently use access policies (legacy) to Azure RBAC for improved security. For more information on why Azure RBAC is recommended, see [Azure role-based access control (Azure RBAC) vs. access policies](rbac-access-policy.md).
3333

@@ -173,7 +173,7 @@ Based on your current access control model, follow the appropriate guidance belo
173173

174174
### Vaults using Azure RBAC
175175

176-
If your key vaults already use Azure RBAC, no access control changes are needed. However, you must update all Key Vault ARM, BICEP, Terraform templates, and [REST API](/rest/api/keyvault/) calls to use API version 2026-02-01 or later before February 27, 2027, when older API versions retire.
176+
If your key vaults already use Azure RBAC, no access control changes are needed. However, you must update all Key Vault control plane management SDKs, ARM, BICEP, Terraform templates, and [REST API](/rest/api/keyvault/) calls to use API version 2026-02-01 or later before February 27, 2027, when older control plane API versions retire.
177177

178178
### Vaults using access policies
179179

@@ -190,15 +190,15 @@ Choose your path:
190190

191191
Use this opportunity to increase your security posture by migrating from vault access policies to Azure RBAC. For detailed migration guidance, see [Migrate from vault access policy to an Azure role-based access control permission model](rbac-migration.md).
192192

193-
After migrating, update all Key Vault ARM, BICEP, Terraform templates, and REST API calls to use API version 2026-02-01 or later.
193+
After migrating, update all Key Vault control plane management SDKs, ARM, BICEP, Terraform templates, and REST API calls to use API version 2026-02-01 or later.
194194

195195
<a name="step-5-continue-using-access-policies"></a>
196196

197197
#### Continue using access policies
198198

199199
Access policies remain a fully supported access control model.
200200

201-
- **Existing vaults**: Vaults already using access policies continue to work without changes. Just ensure your ARM, BICEP, Terraform templates, and REST API calls use API version 2026-02-01 or later before February 27, 2027.
201+
- **Existing vaults**: Vaults already using access policies continue to work without changes. Just ensure your control plane management SDKs, ARM, BICEP, Terraform templates, and REST API calls use API version 2026-02-01 or later before February 27, 2027.
202202
- **New vaults**: When creating new vaults with API version 2026-02-01 or later, you must explicitly set `enableRbacAuthorization` to `false` to use access policies, as described below.
203203

204204
Choose one of the following methods based on your scenario:

0 commit comments

Comments
 (0)