Using Secrets in AppService Environment Variables
Overview
Using secret values in AppService (or FunctionApp) is a common challenge for developers. Terraform is often used to set secrets exported by other resources such as Storage Accounts, but this approach is not convenient as involves lot of downsides. In fact, anyone is able to read AppSettings, sensitive values are stored in plain text in Terraform state file and the secret rotation must be executed manually through Terraform.
This guide aims to instruct developers with best practices, providing guidelines for a better secrets management including the following benefits:
- Updating a value in KeyVault does not require a Terraform Apply anymore: through the Azure Portal it is possible to force new values pulling from KeyVault
- If a secret reference is broken (e.g. missing secret, lack of read permissions, etc.), Azure Portal highlights it in red
- It becomes easier to track where secrets have been used
How-To use Key Vault References as AppSettings
To use secrets from KeyVault as AppSettings values, you can follow these steps:
-
Granting the AppService's system-assigned managed identity access to read secrets:
- For KeyVaults using Access Policies, assign
Get
andList
permissions. - For KeyVaults using RBAC, assign the
Key Vault Secrets User
role.
- For KeyVaults using Access Policies, assign
-
By referencing the secrets from the AppService environment variables, using one between:
@Microsoft.KeyVault(VaultName=<kv-name>;SecretName=<secret-name>)
@Microsoft.KeyVault(SecretUri=https://<kv-name>.vault.azure.net/secrets/<secret-name>)
Despite it is possible to refer a specific secret version, the practice is discouraged as it requires a manual secret rotation. More information is available in the official KeyVault documentation.
Techniques to Facilitate the Code Refactoring
The shared approach requires some code refactoring. We recommend to encapsulate the logic in the submodule of your AppService/Functions Apps in something like:
locals {
local.function_apps.common_app_settings,
{
for s in var.app_settings :
s.name => s.key_vault_secret_name != null ? "@Microsoft.KeyVault(VaultName=${var.key_vault_name};SecretName=${s.key_vault_secret_name})" : s.value
}
}
variable "app_settings" {
type = list(object({
name = string
value = optional(string, "")
key_vault_secret_name = optional(string)
}))
description = "AppSettings configuration"
}
Then, the caller root module could use this code:
app_settings = [
{
name = "secret1"
key_vault_secret_name = "secret1"
},
{
name = "secret2"
key_vault_secret_name = "secret2"
},
{
name = "plan1"
value = "plain value"
},
]
Managing Sensitive Resource Outputs
In some scenarios, the output of a Terraform module may include sensitive values, leading to the issue described above.
To address this, you should save the output value into KeyVault and reference it using the previously illustrated syntax.
To save a secret in the KeyVault:
resource "azurerm_key_vault_secret" "example" {
name = "secret-sauce"
value = "szechuan"
key_vault_id = azurerm_key_vault.example.id
tags = local.tags
}
This code requires either the Set
policy assignment or the
Key Vault Secrets Officer
role.
More info can be found in the official KeyVault documentation.