Skip to content

Azure Key Vault

Valtix integrates with many secret management systems offered by public cloud providers to store the private keys corresponding to the certificates to be used in TLS decryption. This section goes over the steps needed to retrieve a stored private key in Azure Key Vault for a certificate. Valtix supports retrieval of private keys through Azure Key Vault: Secrets.

Azure Key Vault and User-assigned Managed Identities

Valtix uses a user assigned managed identity to access the Azure Key Vault secret. The following steps show how to create the Key Vault and how to grant the managed identity the necessary permissions to access the secret:

  1. Create a new Key Vault e.g. valtix-kv
  2. Create a new User-assigned Managed Identity
  3. In the newly created Key Vault, go to Access Policies
  4. Select Add Access Policy
  5. Assign Secret permissions: Get
  6. Select Principal > Select the Managed Identity
  7. Staying on the Key Vault configuration, go to Access Control (IAM) > Select Add > Role Assignment
  8. Select Reader Role and Search for the Managed Identity in the Select field. Click Save

Storing Private Keys into Azure Key Vault Secrets

Import your private key for your secret into the secrets folder of the Azure Key Vault you had created in the previous section. Since the private key is a multi-line string, this can be imported via the Azure Cloud Shell

Start the Azure Cloud Shell and run the following command:

az keyvault secret set --file <privatekey file> --encoding ascii --vault-name <key vault name> --name <secret name>

The key file is created by simply creating a new file with a text editor (vi) in Azure Cloud Shell, pasting the contents of the private key and saving it.

Configuring your Valtix Gateway with User-assigned Managed Identity

Prior to the following steps, you need to ensure that the Valtix gateway deployed in Azure was configured with the user-managed identity specified in the previous steps.

You will need to copy the Resource ID of the User-Managed Identity created in the previous step.

  1. Go to Managed Identities
  2. Click on the Managed Identity created for the Valtix gateway
  3. Select Property
  4. Select the icon on the right side of the Resource ID field to copy the ID
  5. Paste this Resource ID in the Valtix Gateway configuration for your Azure Gateway under the User Assigned Identity ID field

Valtix configuration to retrieve Private Key

Prior to the following steps, you need to ensure that the Valtix Gateway deployed in Azure was configured with the user-managed identity specified in the previous steps.

Paste the certificate body into the field associated with the private key in the Azure Key Vault secret

Once you have created the Valtix certificate, it can be used with a decryption profile when defining services in Valtix.