Integrate Edge with a Azure Key Vault

You can integrate your Edge site with your existing Azure Key Vault to more easily and securely manage your data source information and set up your Edge site connections. In this topic, we review how to set up the integration between your Edge site and your existing vault.

You can integrate your Edge site with your Azure Key Vault using one of the following authentication methods:

Note There are a few limitations with the Azure Key Vault integration:
  • Forward proxies are not supported for Azure Key Vault integrations. You must have a direct connection to your Azure Key Vault.
  • Only scalar values are accepted for the Azure Key Vault. Each secret needs to resolve a single plain value or file.
  • Only the latest version of secrets can be accessed by your Edge site. You cannot set up and choose from different secret versions.

Managed Identity assigned to Azure Virtual Machine authentication

Prerequisites

On your local server

In your Collibra environment

In your vault platform

Steps

  1. In the cluster where your Edge site is installed, use the Edge CLI tool to run the command for the managed identity assigned to the Azure VM authentication method.
    Copy
    sudo ./edgecli vault create azure managed-identity <name> \
      --desc <description> \
      --dnsSuffix <dnsSuffix>
    Copy
    ./edgecli vault create azure managed-identity <name> \
      --desc <description> \
      --dnsSuffix <dnsSuffix>
    CommandDescription
    <name> (required)The name of the vault instance. It is required and it must be unique within an Edge site. For Kubernetes guidelines on the required naming conventions of the <name> parameter, go to Labels and Selectors.
    Note The name can only contain alphanumeric, dash (-), underscore ( _ ), or period (.) characters. The name cannot include white spaces or special characters such as /, !, ?.
    <description> (optional)The description of the vault instance. The maximum character length is 150.
    <dnsSuffix>The data-plane endpoint for your vault.
    Note <dnsSuffix> is required if you use a private version of Azure for security purposes. For example, for FedRAMP, you would need to specify the Azure US Government DNS suffix: vault.usgovcloudapi.net.

    Otherwise, Edge uses the default value: .vault.azure.net.
  2. Go to your Edge site to confirm the new vault is available in the Vaults tab.

Service Principal Secret authentication

Prerequisites

On your local server

  • You installed your Edge site.
  • You installed and configured the Edge CLI tool.
  • You have access to the data source that will use the vault credentials.

In your Collibra environment

In your vault platform

Steps

  1. In the cluster where your Edge site is installed, use the Edge CLI tool to run the command for the service principal secret authentication method.
    Copy
    sudo ./edgecli vault create azure sp-secret <name> \
      --desc <description> \
      --dnsSuffix <dnsSuffix> \
      --tenantId <tenantId> \
      --clientId <clientId> \
      --clientSecret <clientSecret>
    Copy
    ./edgecli vault create azure sp-secret <name> \
      --desc <description> \
      --dnsSuffix <dnsSuffix> \
      --tenantId <tenantId> \
      --clientId <clientId> \
      --clientSecret <clientSecret>
    CommandDescription
    <name> (required)The name of the vault instance. It is required and it must be unique within an Edge site. For Kubernetes guidelines on the required naming conventions of the <name> parameter, go to Labels and Selectors.
    Note The name can only contain alphanumeric, dash (-), underscore ( _ ), or period (.) characters. The name cannot include white spaces or special characters such as /, !, ?.
    <description> (optional)The description of the vault instance. The maximum character length is 150.
    <dnsSuffix>The data-plane endpoint for your vault.
    Note <dnsSuffix> is required if you use a private version of Azure for security purposes. For example, for FedRAMP, you would need to specify the Azure US Government DNS suffix: vault.usgovcloudapi.net.

    Otherwise, Edge uses the default value: .vault.azure.net.
    <tenantId> (required)The unique identifier of the Azure AD instance that the Azure Key Vault belongs to.
    <clientId> (required) The identifier of the service principal client.
    <clientSecret> (required) The secret of the service principal client.
  2. Go to your Edge site to confirm the new vault is available in the Vaults tab.

Service Principal with PEM authentication

Prerequisites

On your local server

  • You installed your Edge site.
  • You installed and configured the Edge CLI tool.
  • You have access to the data source that will use the vault credentials.

In your Collibra environment

In your vault platform

Steps

  1. In the cluster where your Edge site is installed, use the Edge CLI tool to run the command for the service principal with PEM certificate authentication method.
    Copy
    sudo ./edgecli vault create azure sp-pem <name> \
      --desc <description> \
      --dnsSuffix <dnsSuffix> \
      --tenantId <tenantId> \
      --clientId <clientId> \
      --certPath <certPath>
    Copy
    ./edgecli vault create azure sp-pem <name> \
      --desc <description> \
      --dnsSuffix <dnsSuffix> \
      --tenantId <tenantId> \
      --clientId <clientId> \
      --certPath <certPath>
    CommandDescription
    <name> (required)The name of the vault instance. It is required and it must be unique within an Edge site. For Kubernetes guidelines on the required naming conventions of the <name> parameter, go to Labels and Selectors.
    Note The name can only contain alphanumeric, dash (-), underscore ( _ ), or period (.) characters. The name cannot include white spaces or special characters such as /, !, ?.
    <description> (optional)The description of the vault instance. The maximum character length is 150.
    <dnsSuffix>The data-plane endpoint for your vault.
    Note <dnsSuffix> is required if you use a private version of Azure for security purposes. For example, for FedRAMP, you would need to specify the Azure US Government DNS suffix: vault.usgovcloudapi.net.

    Otherwise, Edge uses the default value: .vault.azure.net.
    <tenantId> (required)The unique identifier of the Azure AD instance that the Azure Key Vault belongs to.
    <clientId> (required) The identifier of the service principal client.
    <certPath> (required)The file containing the Client Certificate.
  2. Go to your Edge site to confirm the new vault is available in the Vaults tab.

Service Principal with PFX certificate authentication

Prerequisites

On your local server

  • You installed your Edge site.
  • You installed and configured the Edge CLI tool.
  • You have access to the data source that will use the vault credentials.

In your Collibra environment

In your vault platform

Steps

  1. In the cluster where your Edge site is installed, use the Edge CLI tool to run the command for the service Principal with PFX certificate authentication method.
    Copy
    sudo ./edgecli vault create azure sp-pfx <name> \
      --desc <description> \
      --dnsSuffix <dnsSuffix> \
      --tenantId <tenantId> \
      --clientId <clientId> \
      --certPath <certPath> \
      --certPassword <certPassword>
    Copy
    ./edgecli vault create azure sp-pfx <name> \
      --desc <description> \
      --dnsSuffix <dnsSuffix> \
      --tenantId <tenantId> \
      --clientId <clientId> \
      --certPath <certPath> \
      --certPassword <certPassword>
    CommandDescription
    <name> (required)The name of the vault instance. It is required and it must be unique within an Edge site. For Kubernetes guidelines on the required naming conventions of the <name> parameter, go to Labels and Selectors.
    Note The name can only contain alphanumeric, dash (-), underscore ( _ ), or period (.) characters. The name cannot include white spaces or special characters such as /, !, ?.
    <description> (optional)The description of the vault instance. The maximum character length is 150.
    <dnsSuffix>The data-plane endpoint for your vault.
    Note <dnsSuffix> is required if you use a private version of Azure for security purposes. For example, for FedRAMP, you would need to specify the Azure US Government DNS suffix: vault.usgovcloudapi.net.

    Otherwise, Edge uses the default value: .vault.azure.net.
    <tenantId> (required)The unique identifier of the Azure AD instance that the Azure Key Vault belongs to.
    <clientId> (required) The identifier of the service principal client.
    <certPath> (required)The file containing the Client Certificate.
    <certPassword> (required)The password used to protect the PFX certificate.
  2. Go to your Edge site to confirm the new vault is available in the Vaults tab.

What's next

  • You can now set up an Edge connection with your Azure Key Vault .
  • You can retrieve and review the configuration details of your vault integrations.
  • You can edit your vault integration configuration.