Azure Key Vault
The Azure Key Vault destination enables Vault to sync and unsync secrets of your choosing into an external Azure account. When configured, Vault will actively maintain the state of each externally-synced secret in realtime. This includes sending new secrets, updating existing secret values, and removing secrets when they either get dissociated from the destination or deleted from Vault.
Prerequisites:
- Ability to read or create KVv2 secrets
- Ability to create Azure AD user credentials with access to an Azure Key Vault
- Ability to create sync destinations and associations on your Vault server
Setup
If you do not already have an Azure Key Vault instance, navigate to the Azure Portal to create a new Key Vault.
A service principal with a client id and client secret will be needed to configure Azure Key Vault as a sync destination. This guide will walk you through creating the service principal.
Once the service principal is created, the next step is to grant the service principal access to Azure Key Vault. To quickly get started, we recommend using the "Key Vault Secrets Officer" built-in role, which gives sufficient access to manage secrets. For more information, see the Permissions section.
Configure a sync destination with the service principal credentials and Key Vault URI created in the previous steps.
Output:
Usage
If you do not already have a KVv2 secret to sync, mount a new KVv2 secrets engine.
Output:
Create secrets you wish to sync with a target Azure Key Vault.
Output:
Create an association between the destination and a secret to synchronize.
Output:
Navigate to Azure Key Vault in the Azure portal to confirm your secret was successfully created.
Moving forward, any modification on the Vault secret will be propagated in near real time to its Azure Key Vault counterpart. Creating a new secret version in Vault will create a new version in Azure Key Vault. Deleting the secret or the association in Vault will delete the secret in your Azure Key Vault as well.
Permissions
For a more minimal set of permissions, you can create a custom role using the following JSON role definition. Be sure to replace the subscription id placeholder.
API
Please see the secrets sync API for more details.