'Masking client secrets in .net application
For my .net application. There are some powerbi values like application id and client secret. But to be on safe side they should be in azure key vault. What would be the workaround for this one?
Solution 1:[1]
- By using
Key Vault, configuration builders in ASP.NET provide a method to edit and override the settings from your web.config file. - Add secrets to the Key Vault - Steps to create Key Vault
- It's critical that the secrets have the same name as the app settings you want to replace them with. For example, if your Web.config file contains an app option named MyConnStr, you must create a secret in Key Vault with the same name and value.
- Give your Web App access to the secrets kept in Key Vault. Use the managed identity functionality of the Web App.
Steps to read a secret stored in an Azure Key Vault instance and Use a managed identity to connect Key Vault to an Azure web app in .NET
Please refer Key Vault support to your ASP.NET - Azure Key Vault and SO thread for more information
Sources
This article follows the attribution requirements of Stack Overflow and is licensed under CC BY-SA 3.0.
Source: Stack Overflow
| Solution | Source |
|---|---|
| Solution 1 | HarshithaVeeramalla-MT |
