To use HashiCorp KeyVault:

<add key="HASHI_CORP_UAMI_CLIENT_ID" value="" />

<add key="HASHI_CORP_LOGIN_URL" value="" />

<add key="HASHI_CORP_UAMI_NAME" value="" />

<add key="HASHI_CORP_NAMESPACE" value="" />

<add key="HASHI_CORP_VAULT_PATH" value="" />

<add key="HASHI_CORP_SECRET_KEY" value="" />

<add key="HASHI_CORP_SECRET_KEY_TYPE" value="PASSWORD" /><!--Possible Values: PASSWORD | CONNECTION_STRING-->

For the tag with the “HASHI_CORP_UAMI_CLIENT_ID” key, specify the unique identifier for the client application integrating with HashiCorp Key Vault connector.

For the tag with the “HASHI_CORP_LOGIN_URL” key, specify the URL where the HashiCorp Vault can be accessed for authentication and authorization.

For the tag with the “HASHI_CORP_UAMI_NAME” key, specify a unique identifier or label within Azure Active Directory (AD), used to identify and manage individual users or entities within the Azure AD framework, ensuring an organized and secure structure for user-related information and permissions. 

For the tag with the “HASHI_CORP_NAMESPACE” key, specify the logical partition within HashiCorp Vault for organizing and managing secrets. 

For the tag with the “HASHI_CORP_VAULT_PATH” key, specify a pathway to a location within the HashiCorp Vault for storing and managing secrets and data. 

For the tag with the “HASHI_CORP_SECRET_KEY” key,  specify the key against which to get the value from the Key Vault.

For the tag with the “HASHI_CORP_SECRET_KEY_TYPE” key, possible values are password and connection string.


For the above tags, add the relevant details of the HashiCorp KeyVault to integrate SigningHub with HashiCorp KeyVault to securely access sensitive information such as secrets stored within HashiCorp Vault. If it's empty then SigningHub will work without the HashiCorp KeyVault integration.






See also