Rather than storing credentials in the application, we can use Azure keyvault to store user secrets. We can also use it to store 1. secret , application that stores the secrets in files can be at risk if someone gets a peek at the source code. KV happens at runtime. 2. keys (for encryption/decryption) 3. certificates (SSL certificates) 4. Storage accounts have access keys and KV can be used to manage them. 5. Azure VM disks encryption. We can encrypt the data stored on VMS using azure disk encryption. 6. In AKS DATA PROTECTION An Azure app service app can use certificates stored in KV to encrypt the data (in transit) or it can be used to encrypt the data stored in a database (in rest) Access control should follow the principle of least privilege. Add new Resource => Keyvault Create a Keyvault Using Keyvault when using azure AD NUGETS: Azure.Identity and Azure.Security.KeyVault.Secrets _______________________________________________________________...
I jot down whatever I learn from different sources.Written for personal use. But anyone can learn.