In the previous posts, we saw how to register an Azure AD app and read the secret from Azure Key Vault using SecretClient and UsernamePasswordCredential class
- https://nishantrana.me/2020/11/27/read-secret-from-azure-key-vault-using-secretclient-class-console-app-c/
- https://nishantrana.me/2020/12/01/read-secret-from-azure-key-vault-using-secretclient-usernamepasswordcredential-c/
In this post, we’d fetch the secret saved in Key Vault through Postman.
- Register an Azure AD App
- Copy its client id and client secret
- Provide the Get Secret permissions to the application for the Key Vault.
Within Postman we’d first fetch the token
Get the URL from endpoints
Format – https://login.microsoftonline.com/{tenantid}/oauth2/v2.0/token
Scope value – https://vault.azure.net/.default
Send the request which responds with the token.
Copy the token
Create the new Get request and pass the Secret identifier with the API version.
https://mykvcrm.vault.azure.net/secrets/MySecret/f046535ef5644ca5a4b43f2a718776b9?api-version=7.1
For authorization select type as Bearer Token and paste the token generated earlier.
Send the request to get the secret’s value as shown below – “itissecret”
Get more details here –
https://docs.microsoft.com/en-us/rest/api/keyvault/getsecrets/getsecrets
Hope it helps..
3 thoughts on “How to – Read Secret from Azure Key Vault using Key Vault Rest API through Postman”