Azure Key Vault Secrets
Azure Key Vault stores and manages secrets, such as passwords and database connection strings. TIBCO Flogo® Enterprise retrieves values for Flogo app properties from Azure Key Vault Secrets and overrides them at runtime.
Integrating Azure Key Vault
To integrate the Flogo app with Azure Key Vault, set the following environment variables for your application:
-
FLOGO_APP_PROPS_AZURE_KEYVAULT
: Set totrue
to enable Azure Key Vault integration. -
FLOGO_AZURE_KEYVAULT_NAME
: Specify the name of your Azure Key Vault.
Authentication Methods
Flogo supports the following authentication methods for accessing Azure Key Vault:
-
Service Principal with Secret
-
Managed Identities for Azure Resources
To configure Azure Key Vault credential management, set the following environment variables at runtime based on your authentication method.
Variable | Description |
---|---|
FLOGO_APP_PROPS_AZURE_KEYVAULT
|
Set this to true to integrate the Flogo app with Azure Key Vault. |
FLOGO_AZURE_KEYVAULT_NAME
|
Specify the Azure Key Vault name. |
AZURE_TENANT_ID
|
The Microsoft Entra tenant (directory) ID. |
AZURE_CLIENT_ID
|
The client (application) ID of an App Registration in the tenant. |
AZURE_CLIENT_SECRET
|
The client secret generated for the App Registration. |
Variable | Description |
---|---|
FLOGO_APP_PROPS_AZURE_KEYVAULT
|
Set this to true to integrate the Flogo app with Azure Key Vault. |
FLOGO_AZURE_KEYVAULT_NAME
|
Specify the Azure Key Vault name. |
-
The Flogo app always fetches the current Azure Key Vault Secret version.
-
The identity used by your application must have at least the Key Vault Secrets User role to retrieve secrets from Azure Key Vault.
-
If Azure Key Vault uses access policies to manage permissions, then the identity used by your application must have at least Get Secret permissions. It is required to retrieve secrets from Azure Key Vault.
Setting Azure Key Vault Secrets
To override the app property values, create a key-value pair for each property in Azure Key Vault Secrets. You can create standalone properties or organize them in a hierarchy.
-
For a standalone property, use the property name as the secret name in Azure Key Vault. If the property name contains an underscore (_), it is replaced with a hyphen (-).
For example, if the app property name is
Property_1
, then the secret lookup is done with nameProperty-1
in Azure Key Vault. -
For hierarchical properties, if the property name contains an end period (.) or an underscore (_), these are replaced with a hyphen (-).
For example, if the app property name is
Group_1.Group_2.Property_1
, then the secret lookup is done with nameGroup-1-Group-2-Property-1
in Azure Key Vault.