Azure Key Vault
:::tip[]
Vault secrets is available on Apidog Enterprise plan.
:::
Apidog supports integration with Azure Key Vault via OIDC auth method.
Configure Microsoft Entra ID
To configure your OIDC application, do the following:
- Open your Microsoft Entra ID management portal in a browser.
- Go to App registrations and select New registration.
- Enter the name of the application, such as "Vault Integration", and click Register.
- On the application's Overview page in App registrations, copy the Application (client) ID and paste it to Client ID field in Apidog.
- Click Endpoints.
- Copy the OAuth 2.0 authorization endpoint (v2) in Microsoft Entra ID, and paste it to the Auth URL field in Apidog.
- Copy the OAuth 2.0 token endpoint (v2) in Microsoft Entra ID, and paste it to the Access Token URL field in Apidog.
- Go to the application's Authentication page in App registrations, click Add a platform, then click Single-page application.
- Copy the Callback URL in Apidog, and paste it to the Redirect URIs.
- Return to the home page of Microsoft Entra ID management portal, go to Enterprise Applications, and click the application you just registered on.
- On the Users and groups page in Enterprise Applications, add users or groups who can access the key vault.
Test connection
- Enter the key vault name in Apidog.
- Click "Test Connection", and the OAuth2.0 login window will pop up. After you log in, "Succeeded" will be displayed.
Link secrets
Assume there is a secret named "foo" in Azure Key Vault as follows:
To link the secret, you need to enter the metadata as shown below:
Finally, click the "Fetch Secrets" button. Then click the eye icon on the right to view the value of the secret.
[updatedIn] 7 days ago
Configure Microsoft Entra ID
Test connection
Link secrets