© 2023 Hashnode
#azure-key-vault
In, Part I of this series we discussed Managed Identities and how Azure Services like App Services allow you to configure system-assigned identities so that app service can obtain secrets from Key Vau…
In this article, we'll discuss what are Managed Identities in Microsoft Azure and how we can use them to secure and host truly credential-less .NET applications in the cloud. What are Managed Identiti…
I was going to write that blog entry on using REST from powershell, as well as Alternate Data Streams on NTFS. And I still will, but to make the journey more coherent, I want to look at keeping secrets first. I'm on my third iteration of a …
So, this should be a quick one. I had a problem recently, I was trying to export certificates from my old Azure Keyvault instance to a new one and i didn't want to download them each and import to the new Azure Keyvault instance. I picked …
When talking about secrets (passwords, tokens, etc.), it goes without saying that this kind of data must be protected. With Azure Key Vault you can rely on a managed service for securely managing keys…
When using some API Clients (like REST Client or the [HTTP Client of JetBrains' IDEs](https://www.jetbrains.com/help/rider/Http_client_in product code_editor.html)), environment variables are stored i…
Doing a policy enforcement, I needed to set an expiraton date on all secrets inside a key vault. When you've 100+ items inside the key vault, you need a quick way to do it. Get all secrets name I use …
Azure Key Vault – what is it? Azure Key Vault is a tool for securely storing and accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, or cer…
Intro In the previous blog post we created an AKS cluster with an nginx ingress controller and certificates retrieved from Azure Key Vault. For this blog post we will extend that previous setup and …
Intro In this blog post I will show you how to deploy nginx ingress controller in AKS and secure the backends with TLS certificates that are stored in Key Vault. Part 2 of this blog post can be foun…