A client for Azure Key Vault that integrates with Aspire, including health checks, logging and telemetry.
$ dotnet add package Aspire.Azure.Security.KeyVaultRetrieves secrets from Azure Key Vault to use in your application. Registers a SecretClient in the DI container for connecting to Azure Key Vault. Enables corresponding health checks, logging and telemetry.
Install the Aspire Azure Key Vault library with NuGet:
dotnet add package Aspire.Azure.Security.KeyVault
In the AppHost.cs file of your project, call the builder.Configuration.AddAzureKeyVaultSecrets extension method to add the secrets in the Azure Key Vault to the application's Configuration. The method takes a connection name parameter.
builder.Configuration.AddAzureKeyVaultSecrets("secrets");
You can then retrieve a secret through normal IConfiguration APIs. For example, to retrieve a secret from a Web API controller:
public ProductsController(IConfiguration configuration)
{
string secretValue = configuration["secretKey"];
}
Alternatively, you can use a SecretClient to retrieve the secrets on demand. In the AppHost.cs file of your project, call the AddAzureKeyVaultClient extension method to register a SecretClient for use via the dependency injection container. The method takes a connection name parameter.
builder.AddAzureKeyVaultClient("secrets");
You can then retrieve the SecretClient instance using dependency injection. For example, to retrieve the client from a Web API controller:
private readonly SecretClient _client;
public ProductsController(SecretClient client)
{
_client = client;
}
See the Azure.Security.KeyVault.Secrets documentation for examples on using the SecretClient.
You can also dependency inject a KeyClient and/or CertificateClient too:
builder.AddAzureKeyVaultKeyClient("keys");
builder.AddAzureKeyVaultCertificateClient("certificates");
Which can then be retrieved in the same way the SecretClient is. For example , to retrieve a KeyClient from a Web API controller:
private readonly KeyClient _client;
public ProductsController(KeyClient client)
{
_client = client;
}
Or to retrieve a CertificateClient from a Web API controller:
private readonly CertificateClient _client;
public ProductsController(CertificateClient client)
{
_client = client;
}
See the Azure.Security.KeyVault.Keys documentation for examples on using the KeyClient.
See the Azure.Security.KeyVault.Certificates documentation for examples on using the CertificateClient.
The Aspire Azure Key Vault library provides multiple options to configure the Azure Key Vault connection based on the requirements and conventions of your project. Note that the VaultUri is required to be supplied.
When using a connection string from the ConnectionStrings configuration section, you can provide the name of the connection string when calling builder.AddAzureKeyVaultClient():
builder.AddAzureKeyVaultClient("secretConnectionName");
And then the vault URI will be retrieved from the ConnectionStrings configuration section. The vault URI which works with the AzureSecurityKeyVaultSettings.Credential property to establish a connection. If no credential is configured, the DefaultAzureCredential is used.
{
"ConnectionStrings": {
"secretConnectionName": "https://{account_name}.vault.azure.net/"
}
}
The Aspire Azure Key Vault library supports Microsoft.Extensions.Configuration. It loads the AzureSecurityKeyVaultSettings and SecretClientOptions from configuration by using the Aspire:Azure:Security:KeyVault key. Example appsettings.json that configures some of the options:
{
"Aspire": {
"Azure": {
"Security": {
"KeyVault": {
"DisableHealthChecks": true,
"DisableTracing": false,
"ClientOptions": {
"Diagnostics": {
"ApplicationId": "myapp"
}
}
}
}
}
}
}
You can also pass the Action<AzureSecurityKeyVaultSettings> configureSettings delegate to set up some or all the options inline, for example to disable health checks from code:
builder.AddAzureKeyVaultClient("secrets", settings => settings.DisableHealthChecks = true);
You can also setup the SecretClientOptions using the optional Action<IAzureClientBuilder<SecretClient, SecretClientOptions>> configureClientBuilder parameter of the AddAzureKeyVaultClient method. For example, to set the first part of "User-Agent" headers for all requests issues by this client:
builder.AddAzureKeyVaultClient("secrets", configureClientBuilder: clientBuilder => clientBuilder.ConfigureOptions(options => options.Diagnostics.ApplicationId = "myapp"));
In your AppHost project, install the Aspire Azure KeyVault Hosting library with NuGet:
dotnet add package Aspire.Hosting.Azure.KeyVault
Then, in the AppHost.cs file of AppHost, add a Key Vault connection and consume the connection using the following methods:
// Service registration
var keyVault = builder.ExecutionContext.IsPublishMode
? builder.AddAzureKeyVault("secrets")
: builder.AddConnectionString("secrets");
// Service consumption
var myService = builder.AddProject<Projects.MyService>()
.WithReference(keyVault);
The AddAzureKeyVault method adds an Azure Key Vault resource to the builder. Or AddConnectionString can be used to read connection information from the AppHost's configuration (for example, from "user secrets") under the ConnectionStrings:secrets config key. The WithReference method passes that connection information into a connection string named secrets in the MyService project. In the Program.cs file of MyService, the connection can be consumed using:
builder.AddAzureKeyVaultClient("secrets");