Conceptly
← All Concepts
🔑

Azure Key Vault

SecurityCentral storage for secrets, cryptographic keys, and certificates

Azure Key Vault stores API keys, connection strings, encryption keys, and TLS certificates in a dedicated security service. It combines centralized storage with identity-based access control and auditability.

Architecture Diagram

🔗 Relationship

Dashed line animations indicate the flow direction of data or requests

Why do you need it?

Applications need credentials and cryptographic material, but hardcoding those values or scattering them across servers creates serious security and operational risk. Exposure, manual rotation, and poor auditability all get worse as systems and teams grow.

Why did this approach emerge?

Early systems often relied on environment files, copied credentials, or hardcoded values. As delivery automation and microservices spread, that pattern became brittle and dangerous. Dedicated secret stores appeared because organizations needed a way to separate sensitive material from code, tie access to identity, and audit every access path.

How does it work inside?

Key Vault stores several classes of sensitive material behind identity checks. Services typically authenticate with managed identities, request the values they are allowed to use, and receive them according to policy. Versioning and rotation then make it possible to change secrets over time without treating every deployment as a manual credential rewrite.

What is it often confused with?

Key Vault and configuration stores both keep values outside code, but they serve different risk profiles. Key Vault is for material whose exposure is a security incident. Configuration stores are better for non-secret settings, feature flags, and operational toggles that do not require the same level of protection.

When should you use it?

Key Vault acts as a central source of truth for secrets used by deployment pipelines and running workloads. It works well when applications need runtime access to credentials, when rotation should happen without editing source code, and when audit trails matter. It is not a place to store bulk encrypted data; it is the place that protects the keys and secrets around that data.

Keep database passwords and API keys out of source codeProtect encryption keys with hardware-backed controlsManage certificate storage and renewal workflowsRotate secrets and keys with less manual handling