Skip to content

Clarify CSR formats supported by Azure Key Vault#137

Open
FabianGonzalez-MS wants to merge 1 commit into
MicrosoftDocs:mainfrom
FabianGonzalez-MS:patch-1
Open

Clarify CSR formats supported by Azure Key Vault#137
FabianGonzalez-MS wants to merge 1 commit into
MicrosoftDocs:mainfrom
FabianGonzalez-MS:patch-1

Conversation

@FabianGonzalez-MS
Copy link
Copy Markdown

Updated the supported formats for merging CSR in Azure Key Vault documentation to include both PKCS#8 and PKCS#7 formats.

Updated the supported formats for merging CSR in Azure Key Vault documentation to include both PKCS#8 and PKCS#7 formats.
@learn-build-service-prod
Copy link
Copy Markdown
Contributor

Learn Build status updates of commit 74b258f:

✅ Validation status: passed

File Status Preview URL Details
articles/key-vault/certificates/certificate-scenarios.md ✅Succeeded

For more details, please refer to the build report.

@FabianGonzalez-MS
Copy link
Copy Markdown
Author

#sign-off

@prmerger-automator
Copy link
Copy Markdown
Contributor

Invalid command: '#sign-off'. Only the assigned author of one or more file in this PR can sign off. @msmbaldwin

@v-regandowner
Copy link
Copy Markdown
Contributor

@msmbaldwin

Can you review the proposed changes?

IMPORTANT: When the changes are ready for publication, adding a #sign-off comment is the best way to signal that the PR is ready for the review team to merge.

#label:"aq-pr-triaged"
@MicrosoftDocs/public-repo-pr-review-team

Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR updates Azure Key Vault certificate documentation to clarify which CSR merge inputs are supported, refining guidance in the certificate scenarios article for users working with externally issued certificates.

Changes:

  • Replaced the old merge-CSR note with explicit guidance for PKCS#8 and PKCS#7 inputs.
  • Added PKCS#7 preparation steps for PEM- and DER-encoded inputs.
  • Added a failure-condition note for unsupported merge input formatting.

Comment on lines +119 to 125
When merging a certificate signing request (CSR), Azure Key Vault accepts input in either PKCS#8 or PKCS#7 format.

- *PKCS#8:* You can provide a PKCS#8-encoded certificate directly with the following headers:

-----BEGIN CERTIFICATE-----

-----END CERTIFICATE-----
Comment on lines +129 to +131
If your PKCS#7 file is in binary (DER) format, you must first convert it to Base64 encoding (for example, by using [certutil -encode](/windows-server/administration/windows-commands/certutil#-encode)). After encoding, remove any header and footer lines that may have been added, and submit only the Base64 content.

Providing the data in any other format, or including headers and footers, will result in a failed merge operation.
@github-actions
Copy link
Copy Markdown

This pull request has been inactive for at least 14 days. If you are finished with your changes, don't forget to sign off. See the contributor guide for instructions.
Get Help
Docs Support Teams Channel
Resolve Merge Conflict

@prmerger-automator
Copy link
Copy Markdown
Contributor

@FabianGonzalez-MS : Thanks for your contribution! The author(s) and reviewer(s) have been notified to review your proposed change.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants