SlideShare a Scribd company logo
2
Most read
14
Most read
17
Most read
Getting Started with
Rahul P Nath
Azure Key Vault
Azure Key Vault
Cloud hosted, HSM(Hardware Security Modules)-
backed service for managing cryptographic keys
and other secrets
Azure key vault
Azure Key Vault
• Container of Objects
• Cost is per Object operations
$0.03 / 10,000 operations
http://bit.ly/keyvaultpricing
Objects
• Keys, Secrets and Certificates
• Identifier
https://{keyvault-name}.vault.azure.net/{object-type}/{object-name}/{object-version}
Keys
• RSA Keys (asymmetric public-private key
cryptosystem)
https://mytestvault.vault.azure.net/keys/mytestkey/cfedea84815e4ca8bc19cf8eb943ee13
Azure key vault
Secrets
• Octet sequences with no semantics
• Connection Strings, Passwords etc.
https://mytestvault.vault.azure.net/secrets/mytestsecret/dcerea54614e4ca7ge14cf2eb943dd45
Certificates
• Import Existing Certificates, Self-signed or Enrol from Public
Certificate Authority (DigiCert, GlobalSign and WoSign)
https://mytestvault.vault.azure.net/certificates/mycertificate/cfedea84815e4ca8bc19cf8eb943ee13
Typical Application Scenario
• Web Application, connects to a Database
• Connection String is in configuration file
Problems
• Security
• Maintenance
How Key Vault Fits in?
• Cloud Hosted
• Accessible over Web API
Azure key vault
Demo
• Create Key Vault and Secret
Key Vault Authentication
• Azure Active Directory (AD) Application
• Access Policies
• Authenticate using Certificate or Secret
Demo
• Create Key Vault and Secret
• Create Azure AD Application
• Consuming Secret
Key Vault and Development Cycle
• Externalize into configuration
Vault Url https://{keyvault-name}.vault.azure.net
Value /{object-type}/{object-name}/{object-version}
• Sensitive information is managed separately
Thank You
@rahulpnath
http://www.rahulpnath.com

More Related Content

PPTX
Azure Key Vault - Getting Started
PDF
Azure Service Endpoints vs. Private Links
PPTX
Azure Storage
PPTX
Azure Security and Management
PPTX
PPT Azure Firewall vs 3rd Party NVA Comparison v1.0.pptx
PPTX
A Deepdive into Azure Networking
PPTX
Introducing Azure Arc
PPTX
Azure Express Route
Azure Key Vault - Getting Started
Azure Service Endpoints vs. Private Links
Azure Storage
Azure Security and Management
PPT Azure Firewall vs 3rd Party NVA Comparison v1.0.pptx
A Deepdive into Azure Networking
Introducing Azure Arc
Azure Express Route

What's hot (20)

PDF
Microsoft Azure Security Overview
PPTX
Azure Migrate
PPTX
Azure active directory
PPTX
Introduction to Azure monitor
PPTX
Azure Cloud Governance
PPTX
Azure Sentinel.pptx
PPTX
Azure role based access control (rbac)
PPTX
Azure Security Overview
PDF
Azure Security Overview
PDF
Azure Monitoring Overview
PDF
[Azure Governance] Lesson 4 : Azure Policy
PPTX
Azure security and Compliance
PDF
Building an Enterprise-Grade Azure Governance Model
PDF
Azure 101
PPTX
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
PPTX
Azure governance
PPTX
Microsoft Cloud Adoption Framework for Azure: Governance Conversation
PDF
Best Practices with Azure Kubernetes Services
PDF
Understanding Azure AD
PPTX
Microsoft Cloud Adoption Framework for Azure: Thru Partner Governance Workshop
Microsoft Azure Security Overview
Azure Migrate
Azure active directory
Introduction to Azure monitor
Azure Cloud Governance
Azure Sentinel.pptx
Azure role based access control (rbac)
Azure Security Overview
Azure Security Overview
Azure Monitoring Overview
[Azure Governance] Lesson 4 : Azure Policy
Azure security and Compliance
Building an Enterprise-Grade Azure Governance Model
Azure 101
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure governance
Microsoft Cloud Adoption Framework for Azure: Governance Conversation
Best Practices with Azure Kubernetes Services
Understanding Azure AD
Microsoft Cloud Adoption Framework for Azure: Thru Partner Governance Workshop
Ad

Viewers also liked (8)

PPTX
Securing sensitive data with Azure Key Vault
PPTX
Microsoft Azure vs Amazon Web Services (AWS) Services & Feature Mapping
PDF
Cloud Native Key Management
PPTX
ITProceed 2015 - Securing Sensitive Data with Azure Key Vault
PPTX
GAB 2015 - Nouveautes sur le stockage de donnees dans Azure
PPTX
Improving Application Security With Azure
PDF
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
PPTX
Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)
Securing sensitive data with Azure Key Vault
Microsoft Azure vs Amazon Web Services (AWS) Services & Feature Mapping
Cloud Native Key Management
ITProceed 2015 - Securing Sensitive Data with Azure Key Vault
GAB 2015 - Nouveautes sur le stockage de donnees dans Azure
Improving Application Security With Azure
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Securing Sensitive Data with Azure Key Vault (Tom Kerkhove @ ITProceed)
Ad

Similar to Azure key vault (20)

PPTX
Azure key vault - Brisbane User Group
PPTX
Managing your secrets in a cloud environment
PPTX
Azure Key Vault
PDF
Secretsth-Azure-KeyVault-and-Azure-App.pdf
PDF
Secretsth-Azure-KeyVault-and-Azure-App.pdf
PPTX
Intelligent Cloud Conference 2018 - Building secure cloud applications with A...
PPTX
Global Azure Bootcamp 2017 - Azure Key Vault
PDF
Azure Meetup: Keep your secrets and configurations safe in azure!
PPTX
Techdays Finland 2018 - Building secure cloud applications with Azure Key Vault
PPTX
Azure Low Lands 2019 - Building secure cloud applications with Azure Key Vault
PPTX
AzureSecurity - Day3 - Storage And Key Vault
PDF
Application Security - Key Vault
PPTX
Hashicorp Chicago HUG - Secure and Automated Workflows in Azure with Vault an...
PDF
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018
PPTX
TechEvent Data Encryption in Azure
PPTX
Secure your Config with Key Vault for .NET Core API
PPTX
Secure your Config with Key Vault for Node.JS
PPTX
Azure Key Vault with a PaaS Architecture and ARM Template Deployment
PDF
Service for Storing Secrets on Microsoft Azure.pdf
PDF
Vault
Azure key vault - Brisbane User Group
Managing your secrets in a cloud environment
Azure Key Vault
Secretsth-Azure-KeyVault-and-Azure-App.pdf
Secretsth-Azure-KeyVault-and-Azure-App.pdf
Intelligent Cloud Conference 2018 - Building secure cloud applications with A...
Global Azure Bootcamp 2017 - Azure Key Vault
Azure Meetup: Keep your secrets and configurations safe in azure!
Techdays Finland 2018 - Building secure cloud applications with Azure Key Vault
Azure Low Lands 2019 - Building secure cloud applications with Azure Key Vault
AzureSecurity - Day3 - Storage And Key Vault
Application Security - Key Vault
Hashicorp Chicago HUG - Secure and Automated Workflows in Azure with Vault an...
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018
TechEvent Data Encryption in Azure
Secure your Config with Key Vault for .NET Core API
Secure your Config with Key Vault for Node.JS
Azure Key Vault with a PaaS Architecture and ARM Template Deployment
Service for Storing Secrets on Microsoft Azure.pdf
Vault

Recently uploaded (20)

PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
cuic standard and advanced reporting.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Electronic commerce courselecture one. Pdf
PDF
KodekX | Application Modernization Development
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Modernizing your data center with Dell and AMD
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Dropbox Q2 2025 Financial Results & Investor Presentation
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
NewMind AI Monthly Chronicles - July 2025
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Understanding_Digital_Forensics_Presentation.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Advanced methodologies resolving dimensionality complications for autism neur...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
cuic standard and advanced reporting.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Electronic commerce courselecture one. Pdf
KodekX | Application Modernization Development
Diabetes mellitus diagnosis method based random forest with bat algorithm
CIFDAQ's Market Insight: SEC Turns Pro Crypto
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Modernizing your data center with Dell and AMD
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows

Azure key vault

Editor's Notes

  • #3: Service is exposed over a REST API Supports Hardware and Software Keys
  • #4: HSM Device, keys are stored on physical device
  • #7: Private portion never leaves the boundary of the vault Sign/Verify (local) Encrypt (local)/Decrypt Wrap local)/Unwrap
  • #12: Anyone that has access to config/servers To change a connection string you need to change in all applications that uses it.
  • #16: Access Policies are at the Object type level – Keys, Secrets, Certificates To set policies at the key level will need to create different key vaults
  • #18: Separate the Vault url and the object identifier part if you want to avoid repeating the URL. Admin can manage the sensitive information separately