9. Application Settings
• Variables passed as environment variables to the application code
• ASP.NET (Core):
• like <appSettings> in web.config or appsettings.json
• values override the ones in web.config or appsettings.json
• DEV settings in web.config or appsettings.json, PRD values in App Settings
• Encrypted-at-rest
• Hidden by default
• Bulk edit
12. App Configuration
Universal, fully managed configuration store
Fast retrieval of configurations for any Azure application
Complete data encryption, at rest or in transit
Native integration with popular frameworks
such as .NET and Java Spring
17. Key Vault
• Secrets Management
• Key Management
• Certificate Management
• Store secrets backed by Hardware Security Modules
18. Why use Key Vault?
• Centralize application secrets
• Securely store secrets and keys
• Monitor access and use
• Simplified administration of application secrets
• Integrate with other Azure services
19. Key Vault
• Tool for securely storing and accessing secrets
• A vault is a logical group of secrets
• Authentication needed
1. Service principal and secret
2. Service principal and certificate
3. Managed Identity
22. Managed Identities for Azure Resources
• Provide Azure services with a managed identity in Azure AD
• Use the identity to authenticate to any service
(that supports Azure AD authentication)
23. Supporting services – Managed Identity
“We are in the process of integrating managed identities for Azure
resources and Azure AD authentication across Azure.”
• Azure Virtual Machines
• Azure Virtual Machine Scale Sets
• Azure App Service
• Azure Blueprints
• Azure Functions
• Azure Logic Apps
• Azure Data Factory V2
• Azure API Management
• Azure Container Instances
• Azure Container Registry Task
24. Supporting services – Azure AD Auth.
“We are in the process of integrating managed identities for Azure
resources and Azure AD authentication across Azure.”
• Azure Resource Manager
• Azure Key Vault
• Azure Data Lake
• Azure SQL
• Azure Event Hub
• Azure Service Bus
• Azure Storage blobs and queues
• Azure Analysis Services
Things like settings how an application works, e-mail addresses to send email from or connection strings to resources like databases.
Tokens, passwords, certificates, API keys, and other secrets
Encryption keys
Certificates!
The secrets and keys can be protected either by software or FIPS 140-2 Level 2 validated HSMs