- 06 Apr 2025
- 1 Minute to read
- DarkLight
- PDF
Azure Key Vaults 1.0.0
- Updated on 06 Apr 2025
- 1 Minute to read
- DarkLight
- PDF
Azure Key Vaults - 1.0.0
tags: Python | Azure | Keys | Secret | Password | Vault
Table of Contents
Description
Integration with Azure Key Vault enables to securely store and tightly control access to passwords. This integration is carried out in order to meet the requirement of one of the packs to store passwords on Azure Key vault.
Azure Key Vault is a cloud service for securely storing and accessing secrets such as API keys, passwords,certificates.
CyberProof has provided actions to get the secret values, Get the secret values and store it to redis, Set a secret value, Set a secret value from redis. In this integration, Key Vault service supports vaults type of containers.
CyberProof has provisioned configuration option to CDC user to set expiry date of secret in key vault. This needs to be configured from data store key. Default expiry date of secret in key vault is set to 3650 days (i.e., 10yrs).
Integration Type: | UCA Infrastructure |
Information read: | Secrets such as passwords |
API Supported: | |
Input: | |
Output: |
Configuration
DataStore
Name | Type | Description | Example | Required | Secret |
---|---|---|---|---|---|
api_azure_key_vaults | object | The key name of the configuration | '{"vault_url":"kusto_cluster_url","tenant_id":"tenant_id","client_id":"client_id","client_secret":"client_secret"}' | True | True |
Pack UI
Option | Type | Description | Required | Secret |
---|---|---|---|---|
instance_name | string | The key name of the configuration in DataStore. | True | False |
Customer Configuration
CDC Command Lines
No CDC command lines
Workflows
No workflows
Rules
No rules
Sensors
No sensors
Triggers
No triggers
Known Issues
No issues