If a key is too close to expiration, an organizational delay to rotate the key may result in an outage. Keys should be rotated at a specified number of days prior to expiration to provide sufficient time to react to a failure.
Use the filters above each column to filter and limit table data. Advanced searches can be performed by using the following operators: <, <=, >, >=, =, *, !, {, }, ||,&&, [empty], [nonempty], rgx: Learn more
Patch, old suffix: preview (1.0.0-preview > 1.0.1)
2020-10-16 12:27:50
add
5ff38825-c5d8-47c5-b70e-069a21955146
JSON compare
compare mode:version left:version right:
1.0.0-preview → 1.0.1RENAMED
@@ -1,13 +1,12 @@
1
{
2
- "displayName": "[Preview]: Keys should have more than the specified number of days before expiration",
3
"policyType": "BuiltIn",
4
"mode": "Microsoft.KeyVault.Data",
5
"description": "If a key is too close to expiration, an organizational delay to rotate the key may result in an outage. Keys should be rotated at a specified number of days prior to expiration to provide sufficient time to react to a failure.",
6
"metadata": {
7
- "version": "1.0.0-preview",
8
- "category": "Key Vault",
9
- "preview": true
10
},
11
"parameters": {
12
"minimumDaysBeforeExpiration": {
13
"type": "Integer",
1
{
2
+ "displayName": "Keys should have more than the specified number of days before expiration",
3
"policyType": "BuiltIn",
4
"mode": "Microsoft.KeyVault.Data",
5
"description": "If a key is too close to expiration, an organizational delay to rotate the key may result in an outage. Keys should be rotated at a specified number of days prior to expiration to provide sufficient time to react to a failure.",
displayName: "Keys should have more than the specified number of days before expiration",
policyType: "BuiltIn",
mode: "Microsoft.KeyVault.Data",
description: "If a key is too close to expiration, an organizational delay to rotate the key may result in an outage. Keys should be rotated at a specified number of days prior to expiration to provide sufficient time to react to a failure.",
description: "'Audit' allows a non-compliant resource to be created, but flags it as non-compliant. 'Deny' blocks the resource creation. 'Disable' turns off the policy."