Azure Key Vault🔗
Azure Key Vault manages keys, secrets, and certificates in the Azure portal. Several functions in Matillion ETL require access to these resources.
Creating secrets in Azure Key Vault🔗
- Log in to your Azure portal account.
- Browse to the Key Vaults service.
- Click Create to open the Create a key vault page at the Basics tab.
- Complete the following fields:
- Resource Group: Select an existing resource group. To create a new resource group, read Create resource groups.
- Key vault name: Give your new key vault a name.
- Region: Select an Azure region.
- Pricing tier: Select Standard or Premium pricing.
- Click the Access Policy tab and review your permission model. Vault Access Policy is the default selection. If you want to select the Azure role-based access control instead, refer to Assign an access policy.
- Click Review + create, and then click Create.
- After a brief period, your key vault will be created. Under Next steps, click Go to resource.
To create and store a secret:
- Click Secrets in the sidebar, then click Generate/Import at the top.
-
Enter the following secret details.
- Upload options: Select Manual.
- Name: Enter
agent-rsa. - Secret value: Enter your secret key. See the note below on multi-line secrets.
Note
- Azure Key Vault strips newlines from secrets being added via the graphical user interface (GUI), which will prevent your secrets from working. Read Store a multi-line secret in Azure Key Vault to work around this issue.
-
The following CLI command will maintain newlines:
az keyvault secret set --vault-name <vault-name> --name <secet-name> --file <key-file-name>
-
Leave the other fields blank, and click Create.
Assign an access policy🔗
Configure your access policy by selecting one of the following permission models:
- Vault Access Policy: The default permission model that determines whether a security principle, such as a user, application, or user group, can perform different operations on keys, secrets, and certificates.
- Azure role-based access control: An authorization system that provides fine-grained access management of Azure resources to grant access at a specific scope level by assigning appropriate Azure roles.
Follow these steps to set the permission model:
- Click the Access policy tab in the Create a key vault process.
- Choose your permission model.
- Select your Resource access.
- If you choose the default Vault access policy, continue to the next step. If you choose Azure role-based access control, continue to step 10.
- Under the Access policies heading, click Create.
- Use the Configure from a template drop-down menu to select an existing template.
-
Add the following Secret permissions:
- Get
- List
Note
These permissions must be set for a secret, not a key or certificate.
-
Click the Principal tab, and choose your principal. Only one principal can be assigned per access policy.
- Click the Application (optional) tab and select an application.
- Click Review + Create, then click Create.
Access control IAM🔗
Use the following steps to assign roles and grant access to your Azure Key Vault resource.
- Access your existing Key Vault resource in your Microsoft Azure portal account.
- Click on the intended key vault.
- Click Access control (IAM) in the sidebar.
- Click Add from the top menu, then click Add role assignment.
- Select the Reader permissions.
- Click Next.
- In the Members tab, select the members you want to assign access to, add an optional description, and add your application.
- Click Next, then click Review + assign.