In-Product Guides
  • Page
  • AWS
  • GCP
  • ACZ
  • Bitbucket
  • GitHub
  • GitLab
  • Azure DevOps
  • Azure Container Registry
  • Azure AKS
  • GCR
  • GKE
  • Google Cloud Build
  • Amazon EKS
  • Amazon ECR
  • SonarQube
  • Minio
  • Docker
  • New Relic
  • Stackhawk
  • Snyk
  • Jira
  • Jenkins
  • Jfrog
  • Sysdig Secure
  • Azure DevOps Repos
  • Terraform Cloud
  • Microsoft Teams
  • Quay
  • Dynatrace
  • Azure KeyVault
  • Google Secret Manager
  • AWS Secrets Manager
  • Hashicorp Vault
Powered by GitBook
On this page

Azure KeyVault

PreviousDynatraceNextGoogle Secret Manager

Last updated 8 months ago

Steps to be followed:

  1. Login to your Azure Console

  2. Generate a Client Secret within the Application

  3. Add a Role Assignment to your Application from the Subscriptions section with the following permissions listed below

  4. Fill in the Client ID, Client Secret, Tenant ID and Azure KeyVault URL

Role Required:

  • Key Vault Secrets Officer - ( Role ID: )

Create an Application Registration
b86a8fe4-44ce-4948-aee5-eccb2c155cd7