KeyVault
Cloud applications and services use cryptographic keys and secrets to help keep information secure. Azure Key Vault safeguards these keys and secrets. When you use Key Vault, you can encrypt authentication keys, storage account keys, data encryption keys, .pfx files, and passwords by using keys that are protected by hardware security modules.
Create KeyVault
The following table shows you the steps for Azure KeyVault Creation:
Task | Image |
---|---|
1. Open Azure Portal | |
2. Start with Create a resource | |
3. Type in Key Vault in the search field | |
4. On the detail page click Create | |
5. Fill out the required fields. Please make sure to use a distinct naming scheme for the keyvault URL. For example: rj-[tenant]-[service] | |
6. Click Review + Create | |
7. Review your settings and configurations and click Create | |
8. Wait for the successful deployment | |
9. Click Go to resource | |
10. Navigate to Access policies | |
11. Click Add Access Policies | |
12. Select Key, Secret & Certificate Management as template and add RealmJoin as Select principal | |
13. Click Key permissions | |
14. For Cryptographic Operations add Decrypt, Encrypt, Unwrap Key, Wrap Key, Verify and Sign | |
15. Click Save and then OK | |
16. Finally, go to Overview and share the DNS Name with the Glück & Kanja support | |
Example Value: https://example-rj-localadmin.vault.azure.net |
KeyVault Storage of Secrets
RealmJoin will not store the secret in any proprietary storage but instead create an Azure KeyVault Secret to store it in a secure and auditable way.
The entry in KeyVault will be added with the device name as a key and the plain GUID as the secret value. See the following example screenshot:
Last updated