Skip to content

Commit dad0ea0

Browse files
authored
Update azure-policy.md
1 parent bed0e26 commit dad0ea0

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/key-vault/general/azure-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -152,7 +152,7 @@ This policy audits all secrets in your key vault and flags secrets that do not h
152152

153153
If a secret is too close to expiration, an organizational delay to rotate the secret may result in an outage. Secrets should be rotated at a specified number of days prior to expiration to provide sufficient time to react to a failure. This policy will audit secrets that are too close to their expiration date and allows you to set this threshold in days. You can also use this policy to prevent the creation of new secrets that are too close to their expiration date.
154154

155-
### Secrets should have the specified maximum validity period (
155+
### Secrets should have the specified maximum validity period
156156

157157
Manage your organizational compliance requirements by specifying the maximum amount of time in days that a secret can be valid within your key vault. Secrets that are valid longer than the threshold you set will be marked as non-compliant. You can also use this policy to block the creation of new secrets that have an expiration date set longer than the maximum validity period you specify.
158158

0 commit comments

Comments
 (0)