Hello Rakshaa Vaidyanathan,
Thanks for reaching out.
Even though the certificate policy specifies a 12-month lifetime with auto-renew at 80%, Azure Key Vault does not enforce the certificate validity period. The actual renewal timing is based on the validity period issued by the Certificate Authority (CA).
The frequent renewal every ~2 weeks strongly indicates that the issuing CA is providing certificates with a short validity period (for example, 14–30 days). Azure Key Vault then calculates the 80% renewal threshold based on that actual issued lifetime, which results in early and frequent rotations.
While it’s good to review the certificate policy, please note:
-
daysBeforeExpirylifetime actions are notification-only and do not trigger renewals. - Secret or key rotation policies and Key Vault automation do not rotate certificates unless explicitly creating new certificate versions.
- Auto-renew is triggered only by
lifetimePercentageand is calculated from the CA-issued validity. Recommended next steps:
- Inspect the validity period of each certificate version (NotBefore / NotAfter).
- Review the issuing CA or certificate template configuration (e.g., AD CS or integrated CA).
- Update the CA to issue certificates with the intended 12-month validity.
- Once the CA issues longer-lived certificates, Key Vault auto-renew will behave as expected.
Please refer to this document: https://learn.microsoft.com/en-us/azure/key-vault/certificates/tutorial-rotate-certificates