Skip to content

Sourcing Azure Pipeline variables from a private Azure Key Vault

License

Notifications You must be signed in to change notification settings

geekzter/azure-pipeline-agent-keyvault-access

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Sourcing Azure Pipeline variables from a private Azure Key Vault

This repo demonstrates how to configure a Variable Group integrated Key Vault for private access. That is, selectively allow access from Azure DevOps and your Self-hosted agents to your Key Vault.

The key components to allow access to an Azure Key Vault are explained below. You can also provision a sample private Key Vault, Self-hosted agent and a Azure DevOps project with pipeline with Terraform, see deployment.

Link an Azure Pipelines Variable Group to a private Azure Key Vault

Azure Pipelines provides the ability to integrate an Azure Key Vault with Variable Groups. A Key Vault that is used as a Variable Group can be accessed:

  1. From Azure DevOps, during Variable Group configuration time
  2. From a Self-hosted agent, during Pipeline job runtime

1. Configure inbound access from Azure DevOps

To allow access from Azure DevOps, you need to allow access from static ranges that are published. These ranges depend on the geography your Azure DevOps organization is in. To find the geography used by your Azure DevOps organization follow this instruction. This page publishes the IP ranges for your geography. This article explains how to configure Key Vault to allow access from static IP ranges.

2. Configure inbound access from Self-hosted Agents

To have the ability to access a private Key Vault from an Azure Pipelines agent, you'll need to use a Self-hosted or Scale set agent. Microsoft Hosted agents are not in the Key Vault trusted services list (no generic compute service is).

To provide line of sight to a Key Vault, you need to configure a private endpoint for the Key Vault. This private endpoint needs to be routable (and its private DNS name resolvable) from the Self-hosted Pipeline agent.

Run the KeyVault task pre-job

If you omit granting Azure DevOps inbound access to your private Key Vault, Variable Group integration won't work. You can still populate Pipeline variables from a Key Vault by specifying the runAsPreJob: true property on the KeyVault task:

  - task: AzureKeyVault@2
    displayName: 'AzureKeyVault@2: Access Key Vault pre-job'
    inputs:
      azureSubscription: '$(serviceConnectionName)'
      keyVaultName: $(keyVaultName)
      secretsFilter: '*'
      runAsPreJob: true

This will inject the KeyVault task before your tasks run, the same way as a Variable Group would.

Key Vault Firewall messages

The below messages mean the Azure Key Vault firewall blocks access:

Public network access is disabled and request is not from a trusted service nor via an approved private link.

Public access has been disabled.

Request was not allowed by NSP rules and the client address is not authorized and caller was ignored because bypass is set to None
Client address: <x.x.x.x>

Public access has been enabled but the client IP address has not been added to the Key Vault firewall.

TF400898: An Internal Error Occurred. Activity Id: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx.

This error can occur when adding a Key Vault as Variable Group and Azure DevOps has not been allowed inbound sufficient access.