When we work on any integrated solution, we often come
across requirement to call API, application or any third-party service which is
already secure. These 3rd party services are secure with authentication.
To call these service, we must pass
token, API key or credentials. Putting these keys or credentials in our code if
not a good idea as this is violation of best coding practice. We need to have secured
managed application where we can keep these secrets and use it where we have
requirement. This way we can also secure the 3rd party service keys
and use them securely.
Azure provides key management service, where we can store
keys, secret and certificate and use them with azure service. To know more
details about azure key vault service please follow this Microsoft key vault documentation link.
In this blog, we are trying to store one secret and in next
blog we will extend our existing logic app which we created in last blog here. We
will access this secret from the logic app.
Let’s get started:
We have already created a keyvault resource, so that we can store
a secret in there and use it from the logic app.
Store a secret:
Click on the Secret link on the left-hand side menu
Click on Generate/Import
Name: secret-key-test
Value: secret-value
We can also set activation and expiry date, but I have kept
as it is. Click save.
Our key should be visible in your secret list.
Our key now has been added successfully, in step we will try
to access it from the logic app.
No comments:
Post a Comment