madsd@microsoft · store the new secret in a secured location (such as azure key vault) and out of...

18

Upload: others

Post on 14-Oct-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 2: madsd@microsoft · Store the new secret in a secured location (such as Azure Key Vault) and out of GitHub Do not publicly share or expose the new secret Remove the published secret

What is a Secret?

Page 3: madsd@microsoft · Store the new secret in a secured location (such as Azure Key Vault) and out of GitHub Do not publicly share or expose the new secret Remove the published secret

What is the problem?

Page 4: madsd@microsoft · Store the new secret in a secured location (such as Azure Key Vault) and out of GitHub Do not publicly share or expose the new secret Remove the published secret
Page 5: madsd@microsoft · Store the new secret in a secured location (such as Azure Key Vault) and out of GitHub Do not publicly share or expose the new secret Remove the published secret

Dude, we are serious…

5

Page 6: madsd@microsoft · Store the new secret in a secured location (such as Azure Key Vault) and out of GitHub Do not publicly share or expose the new secret Remove the published secret

Introducing Managed Identities

Page 7: madsd@microsoft · Store the new secret in a secured location (such as Azure Key Vault) and out of GitHub Do not publicly share or expose the new secret Remove the published secret

Looking at the bigger picture

Page 8: madsd@microsoft · Store the new secret in a secured location (such as Azure Key Vault) and out of GitHub Do not publicly share or expose the new secret Remove the published secret

Managed Identity Architecture

AppSvc/VM/…

Azure Service

(e.g., ARM, Key Vault)Your code

Local token

service

Credentials

1

2

3

Azure (inject and roll credentials)

Page 9: madsd@microsoft · Store the new secret in a secured location (such as Azure Key Vault) and out of GitHub Do not publicly share or expose the new secret Remove the published secret

Azure Services supporting MSI

Page 10: madsd@microsoft · Store the new secret in a secured location (such as Azure Key Vault) and out of GitHub Do not publicly share or expose the new secret Remove the published secret

Azure Services supporting AAD Auth

Page 11: madsd@microsoft · Store the new secret in a secured location (such as Azure Key Vault) and out of GitHub Do not publicly share or expose the new secret Remove the published secret

https://github.com/madsd/azmon 11

Page 14: madsd@microsoft · Store the new secret in a secured location (such as Azure Key Vault) and out of GitHub Do not publicly share or expose the new secret Remove the published secret
Page 15: madsd@microsoft · Store the new secret in a secured location (such as Azure Key Vault) and out of GitHub Do not publicly share or expose the new secret Remove the published secret
Page 17: madsd@microsoft · Store the new secret in a secured location (such as Azure Key Vault) and out of GitHub Do not publicly share or expose the new secret Remove the published secret
Page 18: madsd@microsoft · Store the new secret in a secured location (such as Azure Key Vault) and out of GitHub Do not publicly share or expose the new secret Remove the published secret

© 2017 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other

countries.

The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to

changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the

date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.