Azure Active Directory (AD) can play a crucial role in not only user management, but also with application security for Azure-based solutions. When an application is registered in Azure AD and provided a service principal, it can be used to securely access other Azure resources that support Azure AD authentication. In this hands-on lab, we’ll use an existing service principal and client secret to demonstrate how a registered application can use Azure AD authentication to access Key Vault.
Learning Objectives
Successfully complete this lab by achieving the following learning objectives:
- Create a Key Vault
In the Azure portal, create a key vault.
Ensure the service principal is granted full access to the key vault via an access policy (using the service principal ID provided for you on the lab details page).
- Set Up the Python Application
Either on your own local development environment or within the Azure portal Cloud Shell (Bash), set up the Python application provided for you.
You will need to download the Python application, and use
pip
to install the required Azure packages.- Configure the Python Application
Either on your own local development environment or within the Azure portal Cloud Shell (Bash), add the required Azure AD and key vault details for the Python application.
- Run the Python Application and Access Secrets in the Key Vault
Either on your own local development environment or within the Azure portal Cloud Shell (Bash), run the Python application.
You can test the creation and retrieval of secrets from the key vault.