Skip to main content

Azure Key Vault

Fetch secrets from Azure Key Vault to use as variables in your API requests.

Prerequisites

  • Azure subscription with Key Vault access
  • Azure AD application (service principal)
  • A Key Vault with secrets

Configuration

  1. Go to Settings > Secret Providers
  2. Click Add Provider
  3. Select Azure
  4. Fill in the configuration:
FieldDescription
NameDisplay name for this provider
Vault URLKey Vault URL (e.g., https://myvault.vault.azure.net)
Tenant IDAzure AD tenant ID
Client IDApplication (client) ID
Client SecretClient secret value
Secret NameName of the secret
  1. Click Test Connection to verify credentials
  2. Click Save

Secret Format

Secrets can be stored as JSON key-value pairs:

{
"API_KEY": "sk-xxx",
"DATABASE_URL": "postgres://user:pass@host:5432/db",
"STORAGE_KEY": "your-storage-key"
}

Each key becomes a variable you can use as {{API_KEY}}, {{DATABASE_URL}}, etc.

If your secret is a plain string (not JSON), it will be available using the secret name as the variable name.

RBAC Permissions

Grant the service principal the Key Vault Secrets User role:

Key Vault Secrets User

Or create a custom role with:

Microsoft.KeyVault/vaults/secrets/getSecret/action

Creating an App Registration

  1. Go to Azure AD > App registrations
  2. Click New registration
  3. Name it (e.g., istek-secrets-reader)
  4. Click Register
  5. Copy the Application (client) ID and Directory (tenant) ID
  6. Go to Certificates & secrets > New client secret
  7. Copy the secret value

Granting Key Vault Access

  1. Go to your Key Vault > Access control (IAM)
  2. Click Add role assignment
  3. Select Key Vault Secrets User
  4. Assign to your app registration

Usage

Once configured, click Fetch Secrets to load the secrets. They will be available as variables in your requests:

GET {{API_URL}}/users
Authorization: Bearer {{API_KEY}}