User Review
( votes)In the previous posts, we saw how to register an Azure AD app and read the secret from Azure Key Vault using SecretClient and UsernamePasswordCredential class
In this post, we’d fetch the secret saved in Key Vault through Postman.
- Register an Azure AD App
- Copy its client id and client secret
- Provide the Get Secret permissions to the application for the Key Vault.
Within Postman we’d first fetch the token
Get the URL from endpoints
Format – https://login.microsoftonline.com/{tenantid}/oauth2/v2.0/token
Scope value – https://vault.azure.net/.default
Send the request which responds with the token.
Copy the token
Create the new Get request and pass the Secret identifier with the API version.
https://mykvcrm.vault.azure.net/secrets/MySecret/f046535ef5644ca5a4b43f2a718776b9?api-version=7.1
For authorization select type as Bearer Token and paste the token generated earlier.
Send the request to get the secret’s value as shown below – “itissecret”
Get more details here –
https://docs.microsoft.com/en-us/rest/api/keyvault/getsecrets/getsecrets
Hope it helps..