Learn how to configure a Azure Key Vault Sync for Infisical.
Prerequisites:
The Azure Key Vault Secret Sync requires the following secrets permissions to be set on the user / service principal
for Infisical to sync secrets to Azure Key Vault: secrets/list
, secrets/get
, secrets/set
, secrets/recover
.
Any role with these permissions would work such as the Key Vault Secrets Officer role.
Secrets in Infisical that contain an underscore (_
) will be converted to a hyphen (-
) when synced to Azure Key Vault.
Navigate to Project > Integrations and select the Secret Syncs tab. Click on the Add Sync button.
Select the Azure Key Vault option.
Configure the Source from where secrets should be retrieved, then click Next.
If you need to sync secrets from multiple folder locations, check out secret imports.
Configure the Destination to where secrets should be deployed, then click Next.
Configure the Sync Options to specify how secrets should be synced, then click Next.
{{secretKey}}
as a placeholder for the original secret name and {{environment}}
for the environment.We highly recommend using a Key Schema to ensure that Infisical only manages the specific keys you intend, keeping everything else untouched.
Configure the Details of your Azure Key Vault Sync, then click Next.
Review your Azure Key Vault Sync configuration, then click Create Sync.
If enabled, your Azure Key Vault Sync will begin syncing your secrets to the destination endpoint.