💡 How to rotate VM passwords using GitHub workflows with Azure Key Vault
Overview
Today we are going to look at how we can implement a zero-touch fully automated solution under 15 minutes to rotate all our virtual machines local administrator passwords on a schedule by using a single GitHub workflow and a centrally managed Azure key vault. (The technique/concept used in this tutorial is not limited to only Virtual machines. The same concept can be used and applied to almost anything that requires secret rotation)
In our use case we want to be able to rotate the local administrator password of all virtual machines hosted in an Azure subscription, trigger the rotation manually or on a schedule, ensure each VM has a randomized unique password, and access/store the rotated admin password for each virtual machine inside of the key vault we have hosted in Azure.
In this tutorial we will create a new Azure key vault and a single github workflow as well as a service principal / Azure identity to fully automate everything. We will then populate our key vault with secrets, where the secret key
will be the VM hostname
and the secret value
of the corresponding key will be the VM password
. (Don't worry about setting an actual password just yet, because out github workflow will update this value for us when we create the github workflow and trigger it later in the tutorial). What's important is that the secret key
is named the same as what the VM hostname
is named.
When our github workflow is triggered the workflow will connect to our key vault to retrieve all the secret keys
(in our case these keys will reflect the names of our VM hostnames
). The workflow will then generate a unique randomized password and update the corresponding secret value
for the VM as well as update the VM itself with the newly generated password.
This means that whenever we need to connect to a VM in our subscription using the VMs local admin account
we would go to our centrally managed key vault and look up the VM name key
and get it's password value
to be able to connect to our server, as this password will change automatically on a regular basis by our automation. The virtual machine in this case will be defined in our key vault and have its corresponding password in the key value. This gives us the ability to centrally store, access and maintain all our Azure virtual machines local admin passwords from a central key vault in Azure and our passwords will also be automatically rotated on a regular basis without any manual work. We only need to ensure that the VMs that we want to rotate passwords on have corresponding keys in the key vault, we do also not have to add all our VM names as keys if we do not want to rotate every single VM password and only add the servers in our key vault we do want the passwords to rotate. In fact I would recommend not having domain controller names in the key vault as we would not want to rotate the local admin passwords for servers of this kind.
Note: Maintaining all VM password rotation using an Azure key vault is particularly useful for security or ops teams who maintain secrets management and need to ensure that local admin passwords must rotate on a regular basis.
Protecting secrets in github
Before we start, a quick word on secrets management in GitHub. When using GitHub workflows you need the ability to authenticate to Azure, you may also need to sometimes use passwords, secrets, API keys or connection strings in your source code in order to pass through some configuration of a deployment which needs to be set during the deployment. So how do we protect these sensitive pieces of information that our deployment needs and ensure that they are not in our source control when we start our deployment?
There are a few ways to handle this. One way is to use GitHub Secrets. This is a great way that will allow you to store sensitive information in your organization, repository, or repository environments. In fact we will set up a github secret later in this tutorial to authenticate to Azure to connect to our key vault, retrieve server names and set/change passwords. Even though this is a great feature to be able to have secrets management in GitHub, you may be looking after many repositories all with different secrets, this can become an administrative overhead when secrets or keys need to be rotated on a regular basis for best security practice.
This is where Azure key vault can be utilized as a central source for all our secret management in our GitHub workflows.
Note: Azure key vaults are also particularly useful for security or ops teams who maintain secrets management, instead of giving other teams access to our deployment repositories in GitHub, teams who look after deployments no longer have to worry about giving access to other teams in order to manage secrets as secrets management will be done from an Azure key vault which nicely separates roles of responsibility when spread across different teams.
Let's get started. What do we need to start rotating our virtual machine local admin passwords?
- Azure key vault: This will be where we centrally store, access and manage all our virtual machine local admin passwords.
- Azure AD App & Service Principal: This is what we will use to authenticate to Azure from our github workflow.
- GitHub repository: This is where we will keep our source control and GitHub workflow / automation.
Note: For Steps 1 and 2 above, you can also run the PreReqs.ps1 script, but lets take a look at what that script does in detail below.
1. Create an Azure Key Vault
For this step I will be using Azure CLI using a powershell console. First we will log into Azure by running:
az login
Next we will create a resource group
and key vault
by running:
az group create --name "GitHub-Assets" -l "UKSouth"
az keyvault create --name "github-secrets-vault3" --resource-group "GitHub-Assets" --location "UKSouth" --enable-rbac-authorization
As you see above we use the option --enable-rbac-authorization
. The reason for this is because our service principal we will create in the next step will access this key vault using the RBAC permission model. You can also create an Azure key vault by using the Azure portal. For information on using the portal see this link.
Another nice benefit of using the RBAC model is that if anyone wanted to access certain secrets in our key vault, we will be able to give granular access to individual secrets at the secrets object layer rather than the entire key vault.
Create an Azure AD App & Service Principal
Next we will create our Azure AD App & Service Principal
by running the following in a powershell console window:
# variables
$subscriptionId=$(az account show --query id -o tsv)
$appName="GitHubSecretsUser"
$resourceGroup="GitHub-Assets"
$keyVaultName="github-secrets-vault3"
# Create AAD App and Service Principal and assign to RBAC Role on Key Vault
az ad sp create-for-rbac --name $appName `
--role "Key Vault Secrets Officer" `
--scopes /subscriptions/$subscriptionId/resourceGroups/$resourceGroup/providers/Microsoft.KeyVault/vaults/$keyVaultName `
--sdk-auth
The above command will create an AAD app & service principal and set the correct Role Based Access Control (RBAC)
permissions on our key vault we created earlier. We will give our principal the RBAC/IAM role: Key Vault Secrets Officer because we want our workflow to be able to retrieve secret keys
and also set each key value
.
The above command will also output a JSON object containing the credentials of the service principal that will provide access to the key vault. Copy this JSON object for later. You will only need the sections with the clientId
, clientSecret
, subscriptionId
, and tenantId
values:
{
"clientId": "<GUID>",
"clientSecret": "<PrincipalSecret>",
"subscriptionId": "<GUID>",
"tenantId": "<GUID>"
}
We also want to give our service principal clientId
permissions on our subscription in order to look up VMs as well as set/change VM passwords. We will grant our service principal identity the following RBAC role: Virtual Machine Contributor. Run the following command:
# Assign additional RBAC role to Service Principal Subscription to manage Virtual machines
az ad sp list --display-name $appName --query [].appId -o tsv | ForEach-Object {
az role assignment create --assignee "$_" `
--role "Virtual Machine Contributor" `
--subscription $subscriptionId # SubscriptionId where key vault and Vms are hosted
}
We will also give our signed in user the same key vault access to be able to create secrets later on as we will create secrets representing each of our servers a bit later on in this tutorial.
# Authorize the operation to create a few secrets - Signed in User (Key Vault Secrets Officer)
az ad signed-in-user show --query id -o tsv | foreach-object {
az role assignment create `
--role "Key Vault Secrets Officer" `
--assignee "$_" `
--scope "/subscriptions/$subscriptionId/resourceGroups/$resourceGroup/providers/Microsoft.KeyVault/vaults/$keyVaultName"
}
Configure our GitHub repository
Next we will configure our GitHub repository and GitHub workflow. My GitHub repository is called Azure-VM-Password-Management
. You can also take a look or even use my github repository as a template HERE.
Remember at the beginning of this post I mentioned that we will create a github secret, we will now create this secret on our repository which will be used to authenticate our GitHub workflow to Azure when it's triggered.
In GitHub, browse your repository.
Select Settings > Secrets > New repository secret.
Paste the JSON object output from the Azure CLI command we ran earlier into the secret's value field. Give the secret the name
AZURE_CREDENTIALS
.
Configure our GitHub workflow
Now create a folder in the repository called .github
and underneath another folder called workflows
. In the workflows folder we will create a YAML file called rotate-vm-passwords.yaml
. The YAML file can also be accessed HERE.
name: Update Azure VM passwords
on:
workflow_dispatch:
schedule:
- cron: '0 9 * * 1'
jobs:
publish:
runs-on: windows-latest
env:
KEY_VAULT_NAME: github-secrets-vault3
PASSWORD_LENGTH: 24
steps:
- name: Check out repository
uses: actions/checkout@v3.6.0
- name: Log into Azure using github secret AZURE_CREDENTIALS
uses: Azure/login@v1
with:
creds: ${{ secrets.AZURE_CREDENTIALS }}
enable-AzPSSession: true
- name: Rotate VM administrator passwords
uses: azure/powershell@v1
with:
inlineScript: |
#Generate Randomized Character Set
#---------------------------------
$null = Add-Type -AssemblyName System.Web
$charSet = 'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789{]+-[*=@:)}$^%;(_!&#?>/|.'.ToCharArray()
$crypt = New-Object System.Security.Cryptography.RNGCryptoServiceProvider
$bytes = New-Object 'System.Array[]'(128)
For ($i = 0; $i -lt $bytes.Count ; $i++)
{
$bytes[$i] = New-Object byte[](2)
}
$charSetRandom = New-Object char[](128)
For ($i = 0 ; $i -lt 128 ; $i++) {
Do {
$crypt.GetBytes($bytes[$i])
$num = [System.BitConverter]::ToUInt16($bytes[$i],0)
} While ($num -gt ([uint16]::MaxValue - ([uint16]::MaxValue % $CharSet.Length) -1))
$charSetRandom[$i] = $charSet[$num % $charSet.Length]
}
$charSetRandom = $charSetRandom -join ''
#---------------------------------
#Vm Password rotate Key Vault from Randomized Character Set
#----------------------------------------------------------
[int]$length = ${{ env.PASSWORD_LENGTH }}
$keyVaultName = "${{ env.KEY_VAULT_NAME }}"
Write-Output "Creating array of all VM names in key vault: [$keyVaultName]."
$keys = (Get-AzKeyVaultSecret -VaultName $keyVaultName).Name
Write-Output "Looping through each VM key and changing the local admin password"
Foreach ($key in $keys) {
$vmName = $key
If (Get-AzVm -Name $vmName -ErrorAction SilentlyContinue) {
$resourceGroup = (Get-AzVm -Name $vmName).ResourceGroupName
$location = (Get-AzVm -Name $vmName).Location
Write-Output "Server found: [$vmName]... Checking if VM is in a running state"
$vmObj = Get-AzVm -ResourceGroupName $resourceGroup -Name $vmName -Status
[String]$vmStatusDetail = "deallocated"
Foreach ($vmStatus in $vmObj.Statuses) {
If ($vmStatus.Code -eq "PowerState/running") {
[String]$vmStatusDetail = $vmStatus.Code.Split("/")[1]
}
}
If ($vmStatusDetail -ne "running") {
Write-Warning "VM is NOT in a [running] state... Skipping"
Write-Output "--------------------------"
}
Else {
Write-output "VM is in a [running] state... Generating new secure Password for: [$vmName]"
$passwordGen = (($charSetRandom)[0..64] | Get-Random -Count $length) -join ''
$secretPassword = ConvertTo-SecureString -String $passwordGen -AsPlainText -Force
Write-Output "Updating key vault: [$keyVaultName] with new random secure password for virtual machine: [$vmName]"
$Date = (Get-Date).tostring("dd-MM-yyyy")
$Tags = @{ "Automation" = "GitHub-Workflow"; "Password-Rotated" = "true"; "Password-Rotated-On" = "$Date"}
$null = Set-AzKeyVaultSecret -VaultName $keyVaultName -Name "$vmName" -SecretValue $secretPassword -Tags $Tags
Write-Output "Updating VM with new password..."
$adminUser = (Get-AzVm -Name $vmName | Select-Object -ExpandProperty OSProfile).AdminUsername
$Cred = New-Object System.Management.Automation.PSCredential ($adminUser, $secretPassword)
$null = Set-AzVMAccessExtension -ResourceGroupName $resourceGroup -Location $location -VMName $vmName -Credential $Cred -typeHandlerVersion "2.0" -Name VMAccessAgent
Write-Output "Vm password changed successfully."
Write-Output "--------------------------"
}
}
Else {
Write-Warning "VM NOT found: [$vmName]."
Write-Output "--------------------------"
}
}
#----------------------------------------------------------
azPSVersion: 'latest'
The above YAML workflow is set to trigger automatically every monday at 9am UTC. Which means our workflow will connect to our Azure key vault and get all the VM names we defined, populate the secret values with newly generated passwords and rotate the VMs local admin password with the newly generated password.
Note: If you need to change or use a different key vault or change the password length you can change these lines on the yaml file with the name of the key vault you are using:
// code/rotate-vm-passwords.yaml#L11-L12
KEY_VAULT_NAME: github-secrets-vault3
PASSWORD_LENGTH: 24
The current schedule is set to run on every monday at 9am UTC. If you need to change the cron schedule you can amend this line:
// code/rotate-vm-passwords.yaml#L5-L5
- cron: '0 9 * * 1'
Populate our key vault with VM names
The last step we now need to do is populate our key vault with some servers. Navigate to the key vault and create a new secret giving the VM name as the secret key:
You can just create dummy secrets in the value
field as these will be overwritten when our workflow is triggered:
Note: Only add servers that you want to rotate passwords on, I would recommend NOT adding any servers or VMs such as Domain Controllers to the key vault. Also as you may recall when we created our key vault, we set the key vault to use the RBAC access model, so if someone requests access to a specific secret we can now allow access on the object level meaning we can give access to a specific secret (and not any other secrets). if we used the Vault Access Policy
model access can only be given to the entire vault.
As you can see I have 3 vms defined. When our workflow is triggered it will automatically populate our VM keys with randomly generated passwords and rotate them on a weekly basis at 9am on a monday, if a VM key exists in the key vault but the VM does not exist in the Azure subscription or our principal does not have access to the VM, it will be skipped. Similarly if a VM is de-allocated and the power state is OFF it will also be skipped. The rotation will only happen on VMs that exist and are powered ON. Let's give it a go and see what happens when we trigger our workflow manually.
We can trigger our workflow manually by going to our github repository (The trigger will also happen automatically based on our cron schedule):
Let's take a look at the results of the workflow:
As you can see I have 3 VMs defined in my key vault pwd9000vm01
was powered on and so it's password was rotated. pwd9000vm02
was found, but was de-allocated so was skipped. pwd9000vm03
is a VM which no longer exists in my subscription so I can safely remove the server key from my key vault.
Now lets see if I can log into my server which have had its password rotated:
I hope you have enjoyed this post and have learned something new.
Using the same techniques I have shown in this post, you can pretty much use this process to rotate secrets for almost anything you can think of, whether that be SQL connection strings or even API keys for your applications.
You can also find and use this github repository I used in this post as a template in your own github account to start rotating your VM passwords on a schedule today. ❤️
Author
Like, share, follow me on: 🐙 GitHub | 🐧 X/Twitter | 👾 LinkedIn
Top comments (8)
So, what is your critical thinking on this approach? Do you know what the threats are?
Rotating credentials is a highly recommended security best practice that limits the time frame in which access credentials can be used. It also reduces any possible negative business impact if credentials are ever compromised. Passwords should be unique, never reused or repeated, and randomized on a scheduled basis, especially in response to a specific threat or vulnerability.
It's best to not try and rely or use local admin passwords at all if even possible. You could also look at manually rotating passwords, but if we are starting to look at 100s or ever 1000s of virtual machines that need regular password rotation, an issue is it’s not feasible for most people to adhere to best practices in manually rotating passwords which could leave systems open to being compromised as it would give an attacker ample time to attempt compromising an administrative credential, and even worse if a credential is compromised and used on all virtual machines, all machines in that case could possibly be compromised.
This solution adds an additional layer of protection to virtual machines, is centrally managed and cost effective. One thing to also bear in mind is that the secrets in our case are stored in a key vault, and so the key vault should only be accessed by privileged identities and users. What's also nice about Azure key vault and a great benefit is the ability for automation to also use the key vault by making use of Access policies and using "GET" and "LIST" permissions for those consuming secrets, or even using the newer RBAC model and using Key Vault Secret User which will allow identities to use secrets.
Note: Access policies and the RBAC permission model can't be used together, in the case of the tutorial I have decided to use the newer RBAC based permission model, but the same can be achieved using Access Policies as well.
Okay, that is all well and good policy from the top down 11,000ft view. I urge you to think of your approach and think critically about it, and think about its threats. Basically, write the argument against your approach. Here is one such threat, which can easily be demonstrated.
Run it a few times and examine the results.
This attack is one of the most common.
I'm not entirely sure why you are setting a seed on
get-random
in the above demonstration. Using SetSeed will result in non-random behaviour.In the absence of -SetSeed parameter, Get-Random takes its seed from the cryptographic RandomNumberGenerator from the
System.Security.Cryptography Namespace
. So I am unclear on exactly what threat you mean? Perhaps you could go a bit more into detail?Okay, I set the seed in Get-Random to make the specific point: to realize that once you have a seed for Get-Random then the results are repeatable, or predictable. That is why I said to run several times. I know you would not intentionally put the -SetSeed in the script, of course, except maybe for testing.
That being said, it is documented that Get-Random gets its initial seed from the system clock. Given that your script is scheduled at regular intervals, an attacker can guess the seed range and using a brute force attack can generate the passwords. With that approach, they may have the passwords before you do! Once they find the first one, they have all the others with this approach.
One of the common problems concerning encryption cracking, historically, has been with the use of a random number generator.
The thing is to think "outside the box". Sorry, I am an old professor. The hackers do not play by the rules, but exploit misconceptions or flaws in the system fundamentals that are applied without critical view.
You have a great point there.
I have updated the code with a fix by adding an additional step using the
system.web
assembly to generate a random 64charset and using that set of whichget-random
can derive from.deriving the password from the random set:
This way even if an attacker could potentially guess the seed value there would be no way to be able to tell what charset or what positional chars were used to come to the concluded password as each of the password charsets would have been randomized each time the worflow ran.
You can also test this technique by running:
Better, but basically this is the same thing, only adding an extra level of obscurity/complexity. I do not have the time to do a full analysis, but cursory view says that GeneratePassword has its issues as well.
poshhelp.wordpress.com/2017/01/30/...
And then there are the possible vulnerabilities depending on how you operationally deploy this job. Think about how environment variables may be injected or monitored. You are writing the environment variable to a file, correct? Also, there are other things to think about. You have a "centralized" approach.
To us computer security geeks, this means "single point of failure" or "single point of attack". Think about what can happen if you could intercept or disrupt the connection to your Azure cred vault. It is a web service after all. Furthermore, this is how ransomware tasks are actually happening, getting the admin credentials using out-of-band methods such as social engineering/phishing, or phone attacks, etc. You get that password, and you have got everything. Think about how you might mitigate that attack.
Do not get me wrong, I do not practice what I preach, because personally I use a password manager, which bothers me to no end, but damn, I cannot remember a new password that I have not used for 4 decades. :P
The professor just wants me to tell you to not stop thinking about how you can attack your solution. Assume your attacker has the code (which at this point, they do). For example, I presented this issue, and you made your approach better. Keep going!
Good Luck Marcel!
Thank you for the feedback and pointing out the risks with Get-Random seed value. :)
The workflow env variable in this case is short lived and only used for randomizing the charset at each run, (not the actual password). You could also even use a GitHub secret for the randomized charset instead of an environment variable if you chose to do so, but would need to be rotated manually. Or push the randomized charset to the key vault and pulling it back in as a key vault secret on the main step. There are a few alternatives here to pick from.
The Github actions runner also only exists for the time of the run of the workflow as we are using
github-hosted
runners and is then destroyed.Another thing to also bear in mind is that the tutorial to demonstrate this automation is published on a public GitHub repository for reasons to share knowledge, in practise, if anyone adopts this sort of automation process they would likely use a private or internally hosted repo and not expose the source code or actions workflows publicly (unless they chose to) with only authorised users working on the repo source code.
Azure key vault is also pretty flexible as well in how you can deploy, use and configure secrets management centrally and securely. Especially from the operational side and also making use of private endpoints so that the key vault is not exposed to the public internet or using the firewall and networking features to limit what external services can connect to the vault.
There’s also the topic of permissions, allowing and managing access to the azure key vault only to authorised identities and users using
role based access controls
orAccess Policies
. Some of these topics are a bit out of scope for this tutorial but I would recommend reading up on some of the features and security of azure key vault if you’re interested: Azure Key VaultSome comments have been hidden by the post's author - find out more