Certificates in a Key Vault
You can use a Key Vault to store and manage passwords (or secrets) and certificates. This reduces any risk associated with storing and sensitive information on a local filesystem. At the moment we only support Azure Key Vault, this means we are unable to support password protected certificates.
Credentials and certificates stored within the Control Hub Credentials are not impacted by this.
When loading certificates from an Azure key vault, they cannot be password protected as the password is removed by the vault. When loading a certificate from the filesystem, it can be password protected.
Vault Setup
Aiimi Insight Engine determines how to retrieve passwords and certificates based on the configurations in your appsettings.json files. If a key vault is configured, that is tried first. If that fails or is not configured it will revert to looking locally for passwords and certificates.
Set up certificates - Within your Key Vault you need to set up your certificates, secrets and passwords.
We recommend adding a year to the certificate names. This can help with certificate management and switching certificates.
Vault Access - You need to grant access to the vault, this varies depending on the vault plugin.
Update appsettings.json - Add the Key Vault details to the root of each appsetting.json file.
This can be done manually or via a bulk update.
During set up you can set "enableTracing" to true to help debugging.
This could log sensitive information and must be set to false once it is working correctly.
Replace any certificate and password values with the certificate or secret name in the vault.
Certificate passwords are handled by the vault and should be set to "".
Azure Key Vault
This plugin allows Aiimi Insight Engine to retrieve certificates and passwords from Azure Key Vault. It accesses it via a URI provided in the config, and supports DefaultAzureCredential
. This allows you to control access via secrets or passwords stored in environment variables, managed identities (if running in an Azure environment), Azure CLI/PowerShell or interactive.
This configuration requires the access to be encompassed by DefaultAzure Credentials. However, You should follow your existing procedures when configuring access to the vault.
There is no authentication section to grant access to the vault, this must be setup via environment variables, managed identities, something compatible with DefaultAzureCredentials
.
Last updated