Skip to content

Latest commit

 

History

History
9 lines (8 loc) · 1.06 KB

UseAzureKeyVault.md

File metadata and controls

9 lines (8 loc) · 1.06 KB

#7 Use Azure KeyVault for secrets with AL-Go

Prerequisites: A completed scenario 6, an Azure KeyVault and you will need to follow the guidelines on how to connect to an Azure KeyVault as specified here: https://docs.microsoft.com/en-us/azure/developer/github/github-key-vault. Add your KeyVault name to the the JSON construct from this walkthrough (using “keyVaultName” : “{your keyvault name}”) and add this JSON construct as a repository secret called AZURE_CREDENTIALS. You can also specify the KeyVault name in the AL-Go settings file if you do not wait to mess with the JSON construct.

  1. Add the authContext secret (see scenario 3) and the ghTokenWorkflow secret (see scenario 6) as secrets in your KeyVault. Remove the secrets from repository secrets and environment secrets.
  2. Run the CI/CD pipeline to see that the deployment still works, reading the authContext secret from the KeyVault. runpipeline
  3. Redo scenario 6 to see that Update AL-Go System files still works.

back