RealmJoin Classic
  • Welcome
  • Installation
    • Install Using Microsoft Intune
    • Interactive Installation
    • Connecting a Tenant
  • Infrastructure
  • RealmJoin Windows Client
    • User Interface
    • Client Menu
  • RealmJoin Portal
    • Roles in RealmJoin
    • Clients
    • Users and User Settings
    • Groups and Group Settings
    • App Store
    • Software Packages
    • Request Package
  • Multi-User Devices
  • Core Features
    • Local Admin Password Solution
      • KeyVault
      • Application Insights
    • AnyDesk
      • Internal Tasks
      • Customer Tasks
      • AnyDesk Cloud Connections
    • Notifications
    • Software Report
    • Delivery Optimization for Windows Update
    • BitLocker
    • Intranet Zone
    • Domain Connect
    • Settings
  • Outlook Signatures
  • FAQ
  • Troubleshooting
  • Appendix
  • Changelog
  • Packages
    • Package Lifecycle
    • Package Types
    • Prepare Packages
    • Chocolatey Package
    • Craft Package
    • Updating Packages
    • Core Extension
    • Packaging In-Depth
    • Specialised Packages
    • Workflow (internal GK)
    • JSON - Short Overview
    • 3rd Party NuGet Packages
Powered by GitBook
On this page
  • Create KeyVault
  • KeyVault Storage of Secrets
  1. Core Features
  2. Local Admin Password Solution

KeyVault

Cloud applications and services use cryptographic keys and secrets to help keep information secure. Azure Key Vault safeguards these keys and secrets. When you use Key Vault, you can encrypt authentication keys, storage account keys, data encryption keys, .pfx files, and passwords by using keys that are protected by hardware security modules.

Create KeyVault

The following table shows you the steps for Azure KeyVault Creation:

Task
Image

2. Start with Create a resource

3. Type in Key Vault in the search field

4. On the detail page click Create

5. Fill out the required fields. Please make sure to use a distinct naming scheme for the keyvault URL. For example: rj-[tenant]-[service]

6. Click Review + Create

7. Review your settings and configurations and click Create

8. Wait for the successful deployment

9. Click Go to resource

10. Navigate to Access policies

11. Click Add Access Policies

12. Select Key, Secret & Certificate Management as template and add RealmJoin as Select principal

13. Click Key permissions

14. For Cryptographic Operations add Decrypt, Encrypt, Unwrap Key, Wrap Key, Verify and Sign

15. Click Save and then OK

Example Value: https://example-rj-localadmin.vault.azure.net

KeyVault Storage of Secrets

RealmJoin will not store the secret in any proprietary storage but instead create an Azure KeyVault Secret to store it in a secure and auditable way.

The entry in KeyVault will be added with the device name as a key and the plain GUID as the secret value. See the following example screenshot:

PreviousLocal Admin Password SolutionNextApplication Insights

Last updated 2 years ago

1. Open

16. Finally, go to Overview and share the DNS Name with the

Azure Portal
Glück & Kanja support
CreateKeyVault
KeyVaultStorageofSecrets