Chapter 12: Implementing Secrets, Keys, and Certificate Management with Key Vault
Modern applications often interact with external systems, services, and data stores. These interactions rely on privileged credentials in the form of connection strings, API keys, client secrets, and certificates. Storing these privileged credentials in code or application configuration files is a bad practice and it increases the risk of exposure or leakage.
To mitigate this risk, we need to ensure that this sensitive information is stored and handled securely and is only visible to the application that uses them at runtime. The Azure Key Vault service offers capabilities that we can use to implement this best practice. By the end of this chapter, you will have gained the knowledge, skills, and practical experience to implement Azure Key Vault to secure sensitive application information.
Here are the topics that we will cover:
- Introducing Azure Key Vault
- Understanding secrets, keys...