DEV Community

Cover image for Key Vault | Azure
Ibrahim S
Ibrahim S

Posted on

Key Vault | Azure

🔹 𝗔𝘇𝘂đ—ŋ𝗲 𝗞𝗲𝘆 𝗩𝗮𝘂𝗹𝘁 is a cloud-based service that securely stores and manages cryptographic keys, certificates, and secrets. You can use it to protect and access sensitive data from your applications.

đ—Ļ𝗲𝗰𝘂đ—ŋ𝗲𝗹𝘆 𝘀𝘁đ—ŧđ—ŋ𝗲 𝗮đ—ģ𝗱 đ—ē𝗮đ—ģ𝗮𝗴𝗲 𝘀𝗲đ—ģ𝘀đ—ļ𝘁đ—ļ𝘃𝗲 đ—ļđ—ģđ—ŗđ—ŧđ—ŋđ—ē𝗮𝘁đ—ļđ—ŧđ—ģ 𝘀𝘂𝗰đ—ĩ 𝗮𝘀 𝗸𝗲𝘆𝘀, đ—Ŋ𝗮𝘀𝘀𝘄đ—ŧđ—ŋ𝗱𝘀, 𝗰𝗲đ—ŋ𝘁đ—ļđ—ŗđ—ļ𝗰𝗮𝘁𝗲𝘀, 𝗲𝘁𝗰...

🔹 Azure Key Vault also offers a free tier that includes a limited number of monthly requests and storage. This free tier lets organizations try Azure Key Vault before committing to a paid subscription.

✅ đ—Ļ𝗲𝗰đ—ŋ𝗲𝘁 đ—ē𝗮đ—ģ𝗮𝗴𝗲đ—ē𝗲đ—ģ𝘁: Securely store and tightly control access to tokens, passwords, certificates, API keys, and other secrets.

✅ 𝗞𝗲𝘆 đ—ē𝗮đ—ģ𝗮𝗴𝗲đ—ē𝗲đ—ģ𝘁: Create and control encryption keys that encrypt your data.

✅ 𝗖𝗲đ—ŋ𝘁đ—ļđ—ŗđ—ļ𝗰𝗮𝘁𝗲 đ—ē𝗮đ—ģ𝗮𝗴𝗲đ—ē𝗲đ—ģ𝘁: Provision, manage, and deploy public and private Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates for use with Azure and your internal connected resources.

🔹 Enable storing and managing key and password data for applications without directly giving them access to key data.

🔹 Provides key storage and management platform for both on-premises and cloud-based apps and services.

🔹 Hardware security modules are đ—Ŋđ—ĩ𝘆𝘀đ—ļ𝗰𝗮𝗹 𝗱𝗲𝘃đ—ļ𝗰𝗲𝘀 𝘁đ—ĩ𝗮𝘁 𝗮đ—ŋ𝗲 𝘂𝘀𝗲𝗱 for protecting and managing keys.

There are two different levels of management
1ī¸âƒŖ Managing the Key Vault itself.
2ī¸âƒŖ Access to the data contained in the KeyVault.

✅ Authentication ➡ This is needed to identify the caller for operations.
✅ Authorisation ➡ Once a caller is identified, authorization is used to determine what operations the caller can perform.

🔹 Azure Active Directory is used to 𝗮𝘂𝘁đ—ĩ𝗲đ—ģ𝘁đ—ļ𝗰𝗮𝘁𝗲 𝘂𝘀𝗲đ—ŋ𝘀 𝗮đ—ģ𝗱 𝗮đ—Ŋđ—Ŋ𝗹đ—ļ𝗰𝗮𝘁đ—ļđ—ŧđ—ģ𝘀 which try to access the vault. This authentication is performed by the AAD tenant that the Key Vault is a part of.

🔹 Management operations are 𝗰đ—ŧđ—ģ𝘁đ—ŋđ—ŧ𝗹𝗹𝗲𝗱 đ—¯đ˜† đ—Ĩ𝗕𝗔𝗖. Creation and management are all controlled by RBAC roles. The storing and retrieving of secrets is managed via access policies.

🔹 These access policies are assigned at certain scopes. You can assign an 𝗮𝗰𝗰𝗲𝘀𝘀 đ—Ŋđ—ŧ𝗹đ—ļ𝗰𝘆 where a user can, e.g., 𝗴𝗲𝘁, 𝗹đ—ļ𝘀𝘁, 𝗰đ—ŋ𝗲𝗮𝘁𝗲, 𝘂đ—Ŋ𝗱𝗮𝘁𝗲, 𝗮đ—ģ𝗱 𝗱𝗲𝗰đ—ŋ𝘆đ—Ŋ𝘁 𝗸𝗲𝘆𝘀. Similarly, there are specific copes for managing secrets and certificates.

More Azure Key Vault HandsOn || Key Vault Integration with AKS — Azure ||

Implemented the Azure Key Vault integration with AKS 👆👆👆

Top comments (0)