logo logo

G2S Website Builder

G2S Documentation

Other Links

BETA!Our website & documentation is currently in development.

Microsoft Azure Key Vault

The following article explains how to set up your Azure Key Vault to store your sensitive data. This article assumes you have already created your Microsoft Azure account and enabled your Azure Subscription.

Create Key Vault

Head over to the Azure Portal and from the main screen select "Create a Resource"

azure-create-resource

Now enter of find "Key Vault".

find-key-vault

Click the create button.

create-key-vault

Configure Key Vault

This process is very similar to when we set up your storage account. All we need to do is select the subscription, select the resource group we created earlier when creating a storage account, or create a new one. Enter a unique name, select which region you want. Leave the rest as default and click "Review + Create".

create-key-vault-config

If the validation passed, click "Create".

create-key-vault-passed

After a couple of minutes, the Key Vault will be created. Once created, Click "Go to resource".

create-key-vault-go-to-resource

Vault URI

On the overview tab, you will see a "Vault URI" copy this value so we can paste it in the G2S preferences window.

vault-uri

Open the G2S preferences window, and on the security tab, check "Use Key Vault" and paste the value in the "Vault URI" field.

enter-vault-uri

App Registrations

Now key Vault is set up we need to go to app registrations and register the app. Head over to the Azure Portal and from the main screen, type "app registrations" in the search field at the top, then select "App Registrations".

find-app-registrations

Click New Registration.

new-app-registration

Enter a name and click "Register".

app-registrations-name

Now within the new app registration, on the overview tab, copy the Application (Client) ID, and paste it in G2S preferences.

get-app-client-id

Open the G2S preferences window, and on the security tab, paste the value in the "Client ID" field.

g2s-client-id

Now within the new app registration, click the "Certificates & secrets" tab, and click the "+ New client secret" button.

new-client-secret

Enter a Name/Description for the client secret, choose an expiry date, and click Add.

add-client-secret

Now copy the client secret, Note you need to copy this now, as it will never be visible again.

client-secret

Open the G2S preferences window, and on the security tab, paste the value in the "Client Secret" field.

g2s-client-secret

Now back over to Azure, from the main screen, select the Key Vault we made earlier.

select-key-vault

Now on the Access policies tab, click Add Access Policy.

key-vault-access-policies

Now from the configure template dropdown, select "Secret Management" this selects the Secret Permissions for you. Then click "Select principal".

add-access-policy

Now in the principal list, we need to select the App Registration we created earlier. In my example, I called it G2S Keys, so I need to find G2S Keys and click "Select".

add-access-policy-principal

Now click Add.

add-access-policy-add

Now you should see your access policy, click save and we are done.

save-access-policy