Integrate Edge with a Azure Key Vault

You can integrate your Edge site with your existing Azure Key Vault to more easily and securely manage your data source information and set up your Edge site connections. In this topic, we review how to set up the integration between your Edge site and your existing vault.

You can integrate your Edge site with your Azure Key Vault using one of the following authentication methods:

Note There are a few limitations with the Azure Key Vault integration:

Managed Identity assigned to Azure Virtual Machine authentication

Prerequisites

On your local server

In your Collibra environment

In your vault platform

Steps

  1. In the cluster where your Edge site is installed, use the Edge CLI tool to run the command for the managed identity assigned to the Azure VM authentication method.
    Copy
    sudo ./edgecli vault create azure managed-identity <name> \
      --desc <description> \
      --dnsSuffix <dnsSuffix>
    Copy
    ./edgecli vault create azure managed-identity <name> \
      --desc <description> \
      --dnsSuffix <dnsSuffix>
    CommandDescription
    <name> (required)The name of the vault instance. It is required and it must be unique within an Edge site. For Kubernetes guidelines on the required naming conventions of the <name> parameter, go to Labels and Selectors.
    Note The name can only contain alphanumeric, dash (-), underscore ( _ ), or period (.) characters. The name cannot include white spaces or special characters such as /, !, ?.
    <description> (optional)The description of the vault instance. The maximum character length is 150.
    <dnsSuffix>The data-plane endpoint for your vault.
    Note <dnsSuffix> is required if you use a private version of Azure for security purposes. For example, for FedRAMP, you would need to specify the Azure US Government DNS suffix: vault.usgovcloudapi.net.

    Otherwise, Edge uses the default value: .vault.azure.net.
  2. Go to your Edge site to confirm the new vault is available in the Vaults tab.

Service Principal Secret authentication

Prerequisites

On your local server

In your Collibra environment

In your vault platform

Steps

  1. In the cluster where your Edge site is installed, use the Edge CLI tool to run the command for the service principal secret authentication method.
    Copy
    sudo ./edgecli vault create azure sp-secret <name> \
      --desc <description> \
      --dnsSuffix <dnsSuffix> \
      --tenantId <tenantId> \
      --clientId <clientId> \
      --clientSecret <clientSecret>
    Copy
    ./edgecli vault create azure sp-secret <name> \
      --desc <description> \
      --dnsSuffix <dnsSuffix> \
      --tenantId <tenantId> \
      --clientId <clientId> \
      --clientSecret <clientSecret>
    CommandDescription
    <name> (required)The name of the vault instance. It is required and it must be unique within an Edge site. For Kubernetes guidelines on the required naming conventions of the <name> parameter, go to Labels and Selectors.
    Note The name can only contain alphanumeric, dash (-), underscore ( _ ), or period (.) characters. The name cannot include white spaces or special characters such as /, !, ?.
    <description> (optional)The description of the vault instance. The maximum character length is 150.
    <dnsSuffix>The data-plane endpoint for your vault.
    Note <dnsSuffix> is required if you use a private version of Azure for security purposes. For example, for FedRAMP, you would need to specify the Azure US Government DNS suffix: vault.usgovcloudapi.net.

    Otherwise, Edge uses the default value: .vault.azure.net.
    <tenantId> (required)The unique identifier of the Azure AD instance that the Azure Key Vault belongs to.
    <clientId> (required) The identifier of the service principal client.
    <clientSecret> (required) The secret of the service principal client.
  2. Go to your Edge site to confirm the new vault is available in the Vaults tab.

Service Principal with PEM authentication

Prerequisites

On your local server

In your Collibra environment

In your vault platform

Steps

  1. In the cluster where your Edge site is installed, use the Edge CLI tool to run the command for the service principal with PEM certificate authentication method.
    Copy
    sudo ./edgecli vault create azure sp-pem <name> \
      --desc <description> \
      --dnsSuffix <dnsSuffix> \
      --tenantId <tenantId> \
      --clientId <clientId> \
      --certPath <certPath>
    Copy
    ./edgecli vault create azure sp-pem <name> \
      --desc <description> \
      --dnsSuffix <dnsSuffix> \
      --tenantId <tenantId> \
      --clientId <clientId> \
      --certPath <certPath>
    CommandDescription
    <name> (required)The name of the vault instance. It is required and it must be unique within an Edge site. For Kubernetes guidelines on the required naming conventions of the <name> parameter, go to Labels and Selectors.
    Note The name can only contain alphanumeric, dash (-), underscore ( _ ), or period (.) characters. The name cannot include white spaces or special characters such as /, !, ?.
    <description> (optional)The description of the vault instance. The maximum character length is 150.
    <dnsSuffix>The data-plane endpoint for your vault.
    Note <dnsSuffix> is required if you use a private version of Azure for security purposes. For example, for FedRAMP, you would need to specify the Azure US Government DNS suffix: vault.usgovcloudapi.net.

    Otherwise, Edge uses the default value: .vault.azure.net.
    <tenantId> (required)The unique identifier of the Azure AD instance that the Azure Key Vault belongs to.
    <clientId> (required) The identifier of the service principal client.
    <certPath> (required)The file containing the Client Certificate.
  2. Go to your Edge site to confirm the new vault is available in the Vaults tab.

Service Principal with PFX certificate authentication

Prerequisites

On your local server

In your Collibra environment

In your vault platform

Steps

  1. In the cluster where your Edge site is installed, use the Edge CLI tool to run the command for the service Principal with PFX certificate authentication method.
    Copy
    sudo ./edgecli vault create azure sp-pfx <name> \
      --desc <description> \
      --dnsSuffix <dnsSuffix> \
      --tenantId <tenantId> \
      --clientId <clientId> \
      --certPath <certPath> \
      --certPassword <certPassword>
    Copy
    ./edgecli vault create azure sp-pfx <name> \
      --desc <description> \
      --dnsSuffix <dnsSuffix> \
      --tenantId <tenantId> \
      --clientId <clientId> \
      --certPath <certPath> \
      --certPassword <certPassword>
    CommandDescription
    <name> (required)The name of the vault instance. It is required and it must be unique within an Edge site. For Kubernetes guidelines on the required naming conventions of the <name> parameter, go to Labels and Selectors.
    Note The name can only contain alphanumeric, dash (-), underscore ( _ ), or period (.) characters. The name cannot include white spaces or special characters such as /, !, ?.
    <description> (optional)The description of the vault instance. The maximum character length is 150.
    <dnsSuffix>The data-plane endpoint for your vault.
    Note <dnsSuffix> is required if you use a private version of Azure for security purposes. For example, for FedRAMP, you would need to specify the Azure US Government DNS suffix: vault.usgovcloudapi.net.

    Otherwise, Edge uses the default value: .vault.azure.net.
    <tenantId> (required)The unique identifier of the Azure AD instance that the Azure Key Vault belongs to.
    <clientId> (required) The identifier of the service principal client.
    <certPath> (required)The file containing the Client Certificate.
    <certPassword> (required)The password used to protect the PFX certificate.
  2. Go to your Edge site to confirm the new vault is available in the Vaults tab.

What's next