Submit Search
Upload
Azure Key Vault Integration in Scala
•
Download as PPTX, PDF
•
2 likes
•
1,910 views
Braja Krishna Das
Follow
Managing Secret Information in Azure Key Vault and Scala application to manage secret APIs.
Read less
Read more
Technology
Report
Share
Report
Share
1 of 8
Download now
Recommended
Scala API - Azure Event Hub Integration
Scala API - Azure Event Hub Integration
Braja Krishna Das
Introduction to Azure Blueprints
Introduction to Azure Blueprints
Cheah Eng Soon
Docker 101: Introduction to Docker
Docker 101: Introduction to Docker
Docker, Inc.
Intro to kubernetes
Intro to kubernetes
Faculty of Technical Sciences, University of Novi Sad
Docker Introduction
Docker Introduction
Peng Xiao
Monitoring Kubernetes with Prometheus (Kubernetes Ireland, 2016)
Monitoring Kubernetes with Prometheus (Kubernetes Ireland, 2016)
Brian Brazil
Kubernetes and Prometheus
Kubernetes and Prometheus
Weaveworks
Build CICD Pipeline for Container Presentation Slides
Build CICD Pipeline for Container Presentation Slides
Amazon Web Services
Recommended
Scala API - Azure Event Hub Integration
Scala API - Azure Event Hub Integration
Braja Krishna Das
Introduction to Azure Blueprints
Introduction to Azure Blueprints
Cheah Eng Soon
Docker 101: Introduction to Docker
Docker 101: Introduction to Docker
Docker, Inc.
Intro to kubernetes
Intro to kubernetes
Faculty of Technical Sciences, University of Novi Sad
Docker Introduction
Docker Introduction
Peng Xiao
Monitoring Kubernetes with Prometheus (Kubernetes Ireland, 2016)
Monitoring Kubernetes with Prometheus (Kubernetes Ireland, 2016)
Brian Brazil
Kubernetes and Prometheus
Kubernetes and Prometheus
Weaveworks
Build CICD Pipeline for Container Presentation Slides
Build CICD Pipeline for Container Presentation Slides
Amazon Web Services
Implementing Azure DevOps with your Testing Project
Implementing Azure DevOps with your Testing Project
RTTS
Azure DevOps for Developers
Azure DevOps for Developers
Sarah Dutkiewicz
Comprehensive Terraform Training
Comprehensive Terraform Training
Yevgeniy Brikman
Microsoft Azure VM Cheat Sheet
Microsoft Azure VM Cheat Sheet
Milos Halecka
Big Data Redis Mongodb Dynamodb Sharding
Big Data Redis Mongodb Dynamodb Sharding
Araf Karsh Hamid
Monitoring Kubernetes with Prometheus
Monitoring Kubernetes with Prometheus
Grafana Labs
Docker 101 - Nov 2016
Docker 101 - Nov 2016
Docker, Inc.
Docker Tutorial For Beginners | What Is Docker And How It Works? | Docker Tut...
Docker Tutorial For Beginners | What Is Docker And How It Works? | Docker Tut...
Simplilearn
Devops architecture
Devops architecture
Ojasvi Jagtap
DevSecOps The Evolution of DevOps
DevSecOps The Evolution of DevOps
Michael Man
Spring Boot on Amazon Web Services with Spring Cloud AWS
Spring Boot on Amazon Web Services with Spring Cloud AWS
VMware Tanzu
Getting Started with Azure Artifacts
Getting Started with Azure Artifacts
Callon Campbell
Unleashing Docker with Pipelines in Bitbucket Cloud
Unleashing Docker with Pipelines in Bitbucket Cloud
Atlassian
Introduction to kubernetes
Introduction to kubernetes
Gabriel Carro
2019 DevSecOps Reference Architectures
2019 DevSecOps Reference Architectures
Sonatype
Elastic-Engineering
Elastic-Engineering
Araf Karsh Hamid
Terraform modules restructured
Terraform modules restructured
Ami Mahloof
Introduction to Azure DevOps
Introduction to Azure DevOps
Lorenzo Barbieri
Introduction to container based virtualization with docker
Introduction to container based virtualization with docker
Bangladesh Network Operators Group
DevSecOps: What Why and How : Blackhat 2019
DevSecOps: What Why and How : Blackhat 2019
NotSoSecure Global Services
Securing your Pulsar Cluster with Vault_Chris Kellogg
Securing your Pulsar Cluster with Vault_Chris Kellogg
StreamNative
iOS Keychain by 흰, 민디
iOS Keychain by 흰, 민디
MINJICHO20
More Related Content
What's hot
Implementing Azure DevOps with your Testing Project
Implementing Azure DevOps with your Testing Project
RTTS
Azure DevOps for Developers
Azure DevOps for Developers
Sarah Dutkiewicz
Comprehensive Terraform Training
Comprehensive Terraform Training
Yevgeniy Brikman
Microsoft Azure VM Cheat Sheet
Microsoft Azure VM Cheat Sheet
Milos Halecka
Big Data Redis Mongodb Dynamodb Sharding
Big Data Redis Mongodb Dynamodb Sharding
Araf Karsh Hamid
Monitoring Kubernetes with Prometheus
Monitoring Kubernetes with Prometheus
Grafana Labs
Docker 101 - Nov 2016
Docker 101 - Nov 2016
Docker, Inc.
Docker Tutorial For Beginners | What Is Docker And How It Works? | Docker Tut...
Docker Tutorial For Beginners | What Is Docker And How It Works? | Docker Tut...
Simplilearn
Devops architecture
Devops architecture
Ojasvi Jagtap
DevSecOps The Evolution of DevOps
DevSecOps The Evolution of DevOps
Michael Man
Spring Boot on Amazon Web Services with Spring Cloud AWS
Spring Boot on Amazon Web Services with Spring Cloud AWS
VMware Tanzu
Getting Started with Azure Artifacts
Getting Started with Azure Artifacts
Callon Campbell
Unleashing Docker with Pipelines in Bitbucket Cloud
Unleashing Docker with Pipelines in Bitbucket Cloud
Atlassian
Introduction to kubernetes
Introduction to kubernetes
Gabriel Carro
2019 DevSecOps Reference Architectures
2019 DevSecOps Reference Architectures
Sonatype
Elastic-Engineering
Elastic-Engineering
Araf Karsh Hamid
Terraform modules restructured
Terraform modules restructured
Ami Mahloof
Introduction to Azure DevOps
Introduction to Azure DevOps
Lorenzo Barbieri
Introduction to container based virtualization with docker
Introduction to container based virtualization with docker
Bangladesh Network Operators Group
DevSecOps: What Why and How : Blackhat 2019
DevSecOps: What Why and How : Blackhat 2019
NotSoSecure Global Services
What's hot
(20)
Implementing Azure DevOps with your Testing Project
Implementing Azure DevOps with your Testing Project
Azure DevOps for Developers
Azure DevOps for Developers
Comprehensive Terraform Training
Comprehensive Terraform Training
Microsoft Azure VM Cheat Sheet
Microsoft Azure VM Cheat Sheet
Big Data Redis Mongodb Dynamodb Sharding
Big Data Redis Mongodb Dynamodb Sharding
Monitoring Kubernetes with Prometheus
Monitoring Kubernetes with Prometheus
Docker 101 - Nov 2016
Docker 101 - Nov 2016
Docker Tutorial For Beginners | What Is Docker And How It Works? | Docker Tut...
Docker Tutorial For Beginners | What Is Docker And How It Works? | Docker Tut...
Devops architecture
Devops architecture
DevSecOps The Evolution of DevOps
DevSecOps The Evolution of DevOps
Spring Boot on Amazon Web Services with Spring Cloud AWS
Spring Boot on Amazon Web Services with Spring Cloud AWS
Getting Started with Azure Artifacts
Getting Started with Azure Artifacts
Unleashing Docker with Pipelines in Bitbucket Cloud
Unleashing Docker with Pipelines in Bitbucket Cloud
Introduction to kubernetes
Introduction to kubernetes
2019 DevSecOps Reference Architectures
2019 DevSecOps Reference Architectures
Elastic-Engineering
Elastic-Engineering
Terraform modules restructured
Terraform modules restructured
Introduction to Azure DevOps
Introduction to Azure DevOps
Introduction to container based virtualization with docker
Introduction to container based virtualization with docker
DevSecOps: What Why and How : Blackhat 2019
DevSecOps: What Why and How : Blackhat 2019
Similar to Azure Key Vault Integration in Scala
Securing your Pulsar Cluster with Vault_Chris Kellogg
Securing your Pulsar Cluster with Vault_Chris Kellogg
StreamNative
iOS Keychain by 흰, 민디
iOS Keychain by 흰, 민디
MINJICHO20
Create Your Own Serverless PKI with .NET & Azure Key Vault
Create Your Own Serverless PKI with .NET & Azure Key Vault
Eran Stiller
AuthN deep.dive—ASP.NET Authentication Internals.pdf
AuthN deep.dive—ASP.NET Authentication Internals.pdf
ondrejl1
.NET Fest 2019. Eran Stiller. Create Your Own Serverless PKI with .NET & Azur...
.NET Fest 2019. Eran Stiller. Create Your Own Serverless PKI with .NET & Azur...
NETFest
ASP.NET WEB API
ASP.NET WEB API
Waldyr Felix
API 통신, Retrofit 대신 Ktor 어떠신가요.pdf
API 통신, Retrofit 대신 Ktor 어떠신가요.pdf
ssuserb6c2641
Introduction to PicketLink
Introduction to PicketLink
JBUG London
Dependency injection in Scala
Dependency injection in Scala
Alf Kristian Støyle
Integrating Security Roles into Microsoft Silverlight Applications
Integrating Security Roles into Microsoft Silverlight Applications
Dan Wahlin
The Dynamic Duo of Puppet and Vault tame SSL Certificates - Puppet Camps Cent...
The Dynamic Duo of Puppet and Vault tame SSL Certificates - Puppet Camps Cent...
Nick Maludy
The Dynamic Duo of Puppet and Vault tame SSL Certificates, Nick Maludy
The Dynamic Duo of Puppet and Vault tame SSL Certificates, Nick Maludy
Puppet
Streaming twitter data using kafka
Streaming twitter data using kafka
Kiran Krishna
Secure Communications with VisualWorks - CSTUC 2006
Secure Communications with VisualWorks - CSTUC 2006
Martin Kobetic
Office 365 api vs share point app model
Office 365 api vs share point app model
BIWUG
Final microsoft cloud summit - windows azure building block services
Final microsoft cloud summit - windows azure building block services
stratospheres
Evolution of the REST API
Evolution of the REST API
JeremyOtt5
How to implement authorization in your backend with AWS IAM
How to implement authorization in your backend with AWS IAM
Provectus
Implementing cert-manager in K8s
Implementing cert-manager in K8s
Jose Manuel Ortega Candel
ASP.NET MVC 3.0 Validation
ASP.NET MVC 3.0 Validation
Eyal Vardi
Similar to Azure Key Vault Integration in Scala
(20)
Securing your Pulsar Cluster with Vault_Chris Kellogg
Securing your Pulsar Cluster with Vault_Chris Kellogg
iOS Keychain by 흰, 민디
iOS Keychain by 흰, 민디
Create Your Own Serverless PKI with .NET & Azure Key Vault
Create Your Own Serverless PKI with .NET & Azure Key Vault
AuthN deep.dive—ASP.NET Authentication Internals.pdf
AuthN deep.dive—ASP.NET Authentication Internals.pdf
.NET Fest 2019. Eran Stiller. Create Your Own Serverless PKI with .NET & Azur...
.NET Fest 2019. Eran Stiller. Create Your Own Serverless PKI with .NET & Azur...
ASP.NET WEB API
ASP.NET WEB API
API 통신, Retrofit 대신 Ktor 어떠신가요.pdf
API 통신, Retrofit 대신 Ktor 어떠신가요.pdf
Introduction to PicketLink
Introduction to PicketLink
Dependency injection in Scala
Dependency injection in Scala
Integrating Security Roles into Microsoft Silverlight Applications
Integrating Security Roles into Microsoft Silverlight Applications
The Dynamic Duo of Puppet and Vault tame SSL Certificates - Puppet Camps Cent...
The Dynamic Duo of Puppet and Vault tame SSL Certificates - Puppet Camps Cent...
The Dynamic Duo of Puppet and Vault tame SSL Certificates, Nick Maludy
The Dynamic Duo of Puppet and Vault tame SSL Certificates, Nick Maludy
Streaming twitter data using kafka
Streaming twitter data using kafka
Secure Communications with VisualWorks - CSTUC 2006
Secure Communications with VisualWorks - CSTUC 2006
Office 365 api vs share point app model
Office 365 api vs share point app model
Final microsoft cloud summit - windows azure building block services
Final microsoft cloud summit - windows azure building block services
Evolution of the REST API
Evolution of the REST API
How to implement authorization in your backend with AWS IAM
How to implement authorization in your backend with AWS IAM
Implementing cert-manager in K8s
Implementing cert-manager in K8s
ASP.NET MVC 3.0 Validation
ASP.NET MVC 3.0 Validation
More from Braja Krishna Das
Netezza TwinFin12 Architecture Administration
Netezza TwinFin12 Architecture Administration
Braja Krishna Das
Platform Monitoring and Alert
Platform Monitoring and Alert
Braja Krishna Das
IoT Device Intelligence & Real Time Anomaly Detection
IoT Device Intelligence & Real Time Anomaly Detection
Braja Krishna Das
Real Time IoT Device Intelligence & Anomaly detection
Real Time IoT Device Intelligence & Anomaly detection
Braja Krishna Das
Cassandra Security Configuration
Cassandra Security Configuration
Braja Krishna Das
Azure Service Bus Queue Scala API
Azure Service Bus Queue Scala API
Braja Krishna Das
Azure Service Bus Queue API for Scala
Azure Service Bus Queue API for Scala
Braja Krishna Das
Azure Blob Storage API for Scala and Spark
Azure Blob Storage API for Scala and Spark
Braja Krishna Das
Netezza Architecture and Administration
Netezza Architecture and Administration
Braja Krishna Das
More from Braja Krishna Das
(9)
Netezza TwinFin12 Architecture Administration
Netezza TwinFin12 Architecture Administration
Platform Monitoring and Alert
Platform Monitoring and Alert
IoT Device Intelligence & Real Time Anomaly Detection
IoT Device Intelligence & Real Time Anomaly Detection
Real Time IoT Device Intelligence & Anomaly detection
Real Time IoT Device Intelligence & Anomaly detection
Cassandra Security Configuration
Cassandra Security Configuration
Azure Service Bus Queue Scala API
Azure Service Bus Queue Scala API
Azure Service Bus Queue API for Scala
Azure Service Bus Queue API for Scala
Azure Blob Storage API for Scala and Spark
Azure Blob Storage API for Scala and Spark
Netezza Architecture and Administration
Netezza Architecture and Administration
Recently uploaded
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Patryk Bandurski
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
Enterprise Knowledge
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
null - The Open Security Community
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
2toLead Limited
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Commit University
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
Alfredo García Lavilla
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
Fwdays
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
charlottematthew16
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
charlottematthew16
costume and set research powerpoint presentation
costume and set research powerpoint presentation
phoebematthew05
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Memoori
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
Alex Barbosa Coqueiro
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April Automation LPDG
MarianaLemus7
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
The Digital Insurer
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
shyamraj55
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
hariprasad279825
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
NavinnSomaal
Recently uploaded
(20)
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
costume and set research powerpoint presentation
costume and set research powerpoint presentation
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April Automation LPDG
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
Azure Key Vault Integration in Scala
1.
Application Security Azure Key
Vault
2.
Actors in Key
Vault
3.
Access Control and
Key Vault Authentication
4.
Scala Application for
Key Vault Integration Step 1: Authenticate with Azure Active Directory for Key Vault Application def appKVCredentials (clientId: String, secretId: String): KeyVaultCredentials = { val kvCred: KeyVaultCredentials = new KeyVaultCredentials() { def doAuthenticate(request: ServiceRequestContext , challenge: util.Map[String, String]): Header = { var authorization: String = challenge.get("authorization") var resource: String = challenge.get("resource") println("authorization: "+authorization + " " + resource) var token: AuthenticationResult = getAccessTokenFromClientCredentials(authorization, resource, clientId, secretId); return new BasicHeader("Authorization", token.getAccessTokenType() + " " + token.getAccessToken()); } }; return kvCred }
5.
Scala Application for
Key Vault Integration (Cont.) Step 2: Get Access Token from Key Vault def getAccessTokenFromClientCredentials(authorization: String, resource: String, clientId: String, clientKey: String): AuthenticationResult = { var context: AuthenticationContext = null; var result: AuthenticationResult = null; var service: ExecutorService = null; try { service = Executors.newFixedThreadPool(1); context = new AuthenticationContext(authorization, false, service); var credentials: ClientCredential = new ClientCredential(clientId, clientKey); println("clientKey: "+credentials.getClientSecret + " clientId: "+credentials.getClientId) val future = context.acquireToken(resource, credentials,null); result = future.get } catch { case e: Exception => e.printStackTrace() throw new RuntimeException(e); } finally { service.shutdown(); } if (result == null) { throw new RuntimeException("authentication result was null"); } return result; }
6.
Scala Application for
Key Vault Integration (Cont.) Step 3: Create Key Vault Client with Key Vault Credentials def appKVClient(kvCred: KeyVaultCredentials): KeyVaultClient = { val config: Configuration = KeyVaultConfiguration.configure(null, kvCred); val vc: KeyVaultClient = KeyVaultClientService.create(config); return vc }
7.
Scala Application for
Key Vault Integration (Cont.) Step 4: Get Secret Value from Key Vault a. def getSecretValueFromKV(vc: KeyVaultClient, secretIdentifier: String): String = { val secretValue: Future[Secret] = vc.getSecretAsync(secretIdentifier) return secretValue.get.getValue } b. def getSecretValueFromKV(vc: KeyVaultClient, vaultBaseUrl: String, secretName: String, secretVersion: String): String = { val secretValue: Future[Secret] = vc.getSecretAsync(vaultBaseUrl, secretName, secretVersion) return secretValue.get.getValue }
8.
Questions? Braja Das bkd_108@yahoo.com
Download now