Tutorial - Use Azure Key Vault with an Azure web app in .NET (2024)

  • Article

Azure Key Vault provides a way to store credentials and other secrets with increased security. But your code needs to authenticate to Key Vault to retrieve them. Managed identities for Azure resources help to solve this problem by giving Azure services an automatically managed identity in Microsoft Entra ID. You can use this identity to authenticate to any service that supports Microsoft Entra authentication, including Key Vault, without having to display credentials in your code.

In this tutorial, you'll create and deploy Azure web application to Azure App Service. You'll use a managed identity to authenticate your Azure web app with an Azure key vault using Azure Key Vault secret client library for .NET and the Azure CLI. The same basic principles apply when you use the development language of your choice, Azure PowerShell, and/or the Azure portal.

For more information about Azure App service web applications and deployment presented in this tutorial, see:

  • App Service overview
  • Create an ASP.NET Core web app in Azure App Service
  • Local Git deployment to Azure App Service

Prerequisites

To complete this tutorial, you need:

  • An Azure subscription. Create one for free.
  • The .NET Core 3.1 SDK (or later).
  • A Git installation of version 2.28.0 or greater.
  • The Azure CLI or Azure PowerShell.
  • Azure Key Vault. You can create a key vault by using the Azure portal, the Azure CLI, or Azure PowerShell.
  • A Key Vault secret. You can create a secret by using the Azure portal, PowerShell, or the Azure CLI.

If you already have your web application deployed in Azure App Service, you can skip to configure web app access to a key vault and modify web application code sections.

Create a .NET Core app

In this step, you'll set up the local .NET Core project.

In a terminal window on your machine, create a directory named akvwebapp and make it the current directory:

mkdir akvwebappcd akvwebapp

Create a .NET Core app by using the dotnet new web command:

dotnet new web

Run the application locally so you know how it should look when you deploy it to Azure:

dotnet run

In a web browser, go to the app at http://localhost:5000.

You'll see the "Hello World!" message from the sample app displayed on the page.

For more information about creating web applications for Azure, see Create an ASP.NET Core web app in Azure App Service

Deploy the app to Azure

In this step, you'll deploy your .NET Core application to Azure App Service by using local Git. For more information on how to create and deploy applications, see Create an ASP.NET Core web app in Azure.

Configure the local Git deployment

In the terminal window, select Ctrl+C to close the web server. Initialize a Git repository for the .NET Core project:

git init --initial-branch=maingit add .git commit -m "first commit"

You can use FTP and local Git to deploy an Azure web app by using a deployment user. After you configure your deployment user, you can use it for all your Azure deployments. Your account-level deployment user name and password are different from your Azure subscription credentials.

To configure the deployment user, run the az webapp deployment user set command. Choose a user name and password that adheres to these guidelines:

  • The user name must be unique within Azure. For local Git pushes, it can't contain the at sign symbol (@).
  • The password must be at least eight characters long and contain two of the following three elements: letters, numbers, and symbols.
az webapp deployment user set --user-name "<username>" --password "<password>"

The JSON output shows the password as null. If you get a 'Conflict'. Details: 409 error, change the user name. If you get a 'Bad Request'. Details: 400 error, use a stronger password.

Record your user name and password so you can use it to deploy your web apps.

Create a resource group

A resource group is a logical container into which you deploy Azure resources and manage them. Create a resource group to contain both your key vault and your web app by using the az group create command:

az group create --name "myResourceGroup" -l "EastUS"

Create an App Service plan

Create an App Service plan by using the Azure CLI az appservice plan create command. This following example creates an App Service plan named myAppServicePlan in the FREE pricing tier:

az appservice plan create --name myAppServicePlan --resource-group myResourceGroup --sku FREE

When the App Service plan is created, the Azure CLI displays information similar to what you see here:

{ "adminSiteName": null, "appServicePlanName": "myAppServicePlan", "geoRegion": "West Europe", "hostingEnvironmentProfile": null, "id": "/subscriptions/0000-0000/resourceGroups/myResourceGroup/providers/Microsoft.Web/serverfarms/myAppServicePlan", "kind": "app", "location": "West Europe", "maximumNumberOfWorkers": 1, "name": "myAppServicePlan", < JSON data removed for brevity. > "targetWorkerSizeId": 0, "type": "Microsoft.Web/serverfarms", "workerTierName": null} 

For more information, see Manage an App Service plan in Azure.

Create a web app

Create an Azure web app in the myAppServicePlan App Service plan.

Important

Like a key vault, an Azure web app must have a unique name. Replace <your-webapp-name> with the name of your web app in the following examples.

az webapp create --resource-group "myResourceGroup" --plan "myAppServicePlan" --name "<your-webapp-name>" --deployment-local-git

When the web app is created, the Azure CLI shows output similar to what you see here:

Local git is configured with url of 'https://<username>@<your-webapp-name>.scm.azurewebsites.net/<ayour-webapp-name>.git'{ "availabilityState": "Normal", "clientAffinityEnabled": true, "clientCertEnabled": false, "clientCertExclusionPaths": null, "cloningInfo": null, "containerSize": 0, "dailyMemoryTimeQuota": 0, "defaultHostName": "<your-webapp-name>.azurewebsites.net", "deploymentLocalGitUrl": "https://<username>@<your-webapp-name>.scm.azurewebsites.net/<your-webapp-name>.git", "enabled": true, < JSON data removed for brevity. >}

The URL of the Git remote is shown in the deploymentLocalGitUrl property, in the format https://<username>@<your-webapp-name>.scm.azurewebsites.net/<your-webapp-name>.git. Save this URL. You'll need it later.

Now configure your web app to deploy from the main branch:

 az webapp config appsettings set -g MyResourceGroup --name "<your-webapp-name>" --settings deployment_branch=main

Go to your new app by using the following command. Replace <your-webapp-name> with your app name.

https://<your-webapp-name>.azurewebsites.net

You'll see the default webpage for a new Azure web app.

Deploy your local app

Back in the local terminal window, add an Azure remote to your local Git repository. In the following command, replace <deploymentLocalGitUrl-from-create-step> with the URL of the Git remote that you saved in the Create a web app section.

git remote add azure <deploymentLocalGitUrl-from-create-step>

Use the following command to push to the Azure remote to deploy your app. When Git Credential Manager prompts you for credentials, use the credentials you created in the Configure the local Git deployment section.

git push azure main

This command might take a few minutes to run. While it runs, it displays information similar to what you see here:

Enumerating objects: 5, done.Counting objects: 100% (5/5), done.Compressing objects: 100% (3/3), done.Writing objects: 100% (3/3), 285 bytes | 95.00 KiB/s, done.Total 3 (delta 2), reused 0 (delta 0), pack-reused 0remote: Deploy Asyncremote: Updating branch 'main'.remote: Updating submodules.remote: Preparing deployment for commit id 'd6b54472f7'.remote: Repository path is /home/site/repositoryremote: Running oryx build...remote: Build orchestrated by Microsoft Oryx, https://github.com/Microsoft/Oryxremote: You can report issues at https://github.com/Microsoft/Oryx/issuesremote:remote: Oryx Version : 0.2.20200114.13, Commit: 204922f30f8e8d41f5241b8c218425ef89106d1d, ReleaseTagName: 20200114.13remote: Build Operation ID: |imoMY2y77/s=.40ca2a87_remote: Repository Commit : d6b54472f7e8e9fd885ffafaa64522e74cf370e1...remote: Deployment successful.remote: Deployment Logs : 'https://<your-webapp-name>.scm.azurewebsites.net/newui/jsonviewer?view_url=/api/deployments/d6b54472f7e8e9fd885ffafaa64522e74cf370e1/log'To https://<your-webapp-name>.scm.azurewebsites.net:443/<your-webapp-name>.git d87e6ca..d6b5447 main -> main

Go to (or refresh) the deployed application by using your web browser:

http://<your-webapp-name>.azurewebsites.net

You'll see the "Hello World!" message you saw earlier when you visited http://localhost:5000.

For more information about deploying web application using Git, see Local Git deployment to Azure App Service

Configure the web app to connect to Key Vault

In this section, you'll configure web access to Key Vault and update your application code to retrieve a secret from Key Vault.

Create and assign access to a managed identity

In this tutorial, we'll use managed identity to authenticate to Key Vault. Managed identity automatically manages application credentials.

In the Azure CLI, to create the identity for the application, run the az webapp-identity assign command:

az webapp identity assign --name "<your-webapp-name>" --resource-group "myResourceGroup"

The command will return this JSON snippet:

{ "principalId": "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx", "tenantId": "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx", "type": "SystemAssigned"}
  • Azure CLI
  • Azure PowerShell

To grant your application permissions to your key vault through Role-Based Access Control (RBAC), assign a role using the Azure CLI command az role assignment create.

az role assignment create --role "Key Vault Secrets User" --assignee "<app-id>" --scope "/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.KeyVault/vaults/<your-unique-keyvault-name>"

Replace <app-id>, <subscription-id>, <resource-group-name> and <your-unique-keyvault-name> with your actual values. <app-id> is the Application (client) ID of your registered application in Microsoft Entra.

Modify the app to access your key vault

In this tutorial, you'll use Azure Key Vault secret client library for demonstration purposes. You can also use Azure Key Vault certificate client library, or Azure Key Vault key client library.

Install the packages

From the terminal window, install the Azure Key Vault secret client library for .NET and Azure Identity client library packages:

dotnet add package Azure.Identitydotnet add package Azure.Security.KeyVault.Secrets

Update the code

Find and open the Startup.cs file for .NET 5.0 or earlier, or Program.cs file for .NET 6.0 in your akvwebapp project.

Add these lines to the header:

using Azure.Identity;using Azure.Security.KeyVault.Secrets;using Azure.Core;

Add the following lines before the app.UseEndpoints call (.NET 5.0 or earlier) or app.MapGet call (.NET 6.0), updating the URI to reflect the vaultUri of your key vault. This code uses DefaultAzureCredential() to authenticate to Key Vault, which uses a token from managed identity to authenticate. For more information about authenticating to Key Vault, see the Developer's Guide. The code also uses exponential backoff for retries in case Key Vault is being throttled. For more information about Key Vault transaction limits, see Azure Key Vault throttling guidance.

SecretClientOptions options = new SecretClientOptions() { Retry = { Delay= TimeSpan.FromSeconds(2), MaxDelay = TimeSpan.FromSeconds(16), MaxRetries = 5, Mode = RetryMode.Exponential } };var client = new SecretClient(new Uri("https://<your-unique-key-vault-name>.vault.azure.net/"), new DefaultAzureCredential(),options);KeyVaultSecret secret = client.GetSecret("<mySecret>");string secretValue = secret.Value;
.NET 5.0 or earlier

Update the line await context.Response.WriteAsync("Hello World!"); to look like this line:

await context.Response.WriteAsync(secretValue);
.NET 6.0

Update the line app.MapGet("/", () => "Hello World!"); to look like this line:

app.MapGet("/", () => secretValue);

Be sure to save your changes before continuing to the next step.

Redeploy your web app

Now that you've updated your code, you can redeploy it to Azure by using these Git commands:

git add .git commit -m "Updated web app to access my key vault"git push azure main

Go to your completed web app

http://<your-webapp-name>.azurewebsites.net

Where before you saw "Hello World!", you should now see the value of your secret displayed.

Next steps

  • Use Azure Key Vault with applications deployed to a virtual machine in .NET
  • Learn more about managed identities for Azure resources
  • View the Developer's Guide
  • Secure access to a key vault
Tutorial - Use Azure Key Vault with an Azure web app in .NET (2024)
Top Articles
SSI vs. SSDI: What Are These Benefits and How Do They Differ?
What to Own When the Dollar Collapses: Fiat Currency Collapse | 2024 Edition
1970 Chevelle Ss For Sale Craigslist
La connexion à Mon Compte
My Boyfriend Has No Money And I Pay For Everything
How Much Is 10000 Nickels
Richard Sambade Obituary
Marist Dining Hall Menu
Needle Nose Peterbilt For Sale Craigslist
Obituary Times Herald Record
What Does Dwb Mean In Instagram
W303 Tarkov
Brutál jó vegán torta! – Kókusz-málna-csoki trió
Med First James City
I Wanna Dance with Somebody : séances à Paris et en Île-de-France - L'Officiel des spectacles
Nalley Tartar Sauce
Clear Fork Progress Book
Craigslist Red Wing Mn
ELT Concourse Delta: preparing for Module Two
Heart Ring Worth Aj
Jail View Sumter
11 Ways to Sell a Car on Craigslist - wikiHow
Target Minute Clinic Hours
Chamberlain College of Nursing | Tuition & Acceptance Rates 2024
Airline Reception Meaning
480-467-2273
Ficoforum
Meet the Characters of Disney’s ‘Moana’
Craigslist Rentals Coquille Oregon
The Goonies Showtimes Near Marcus Rosemount Cinema
Gus Floribama Shore Drugs
The Latest: Trump addresses apparent assassination attempt on X
Wake County Court Records | NorthCarolinaCourtRecords.us
Six Flags Employee Pay Stubs
Kgirls Seattle
Weekly Math Review Q2 7 Answer Key
The Attleboro Sun Chronicle Obituaries
Nami Op.gg
Advance Auto.parts Near Me
Go Nutrients Intestinal Edge Reviews
Devotion Showtimes Near Showplace Icon At Valley Fair
Theatervoorstellingen in Nieuwegein, het complete aanbod.
Jeep Forum Cj
Makes A Successful Catch Maybe Crossword Clue
Treatise On Jewelcrafting
Verilife Williamsport Reviews
Ics 400 Test Answers 2022
Osrs Vorkath Combat Achievements
Ingersoll Greenwood Funeral Home Obituaries
Adams County 911 Live Incident
Sunset On November 5 2023
Bellin Employee Portal
Latest Posts
Article information

Author: Kimberely Baumbach CPA

Last Updated:

Views: 6100

Rating: 4 / 5 (61 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Kimberely Baumbach CPA

Birthday: 1996-01-14

Address: 8381 Boyce Course, Imeldachester, ND 74681

Phone: +3571286597580

Job: Product Banking Analyst

Hobby: Cosplaying, Inline skating, Amateur radio, Baton twirling, Mountaineering, Flying, Archery

Introduction: My name is Kimberely Baumbach CPA, I am a gorgeous, bright, charming, encouraging, zealous, lively, good person who loves writing and wants to share my knowledge and understanding with you.