Centralize Azure app configuration and security

Cloud-based applications often run on multiple virtual machines or containers in multiple regions, and use multiple external services. Creating a robust and scalable application in a distributed environment presents a significant challenge. Azure App Configuration lets you manage and store all your app's configuration settings and feature flags, and secure access settings, in one place.

App Configuration works seamlessly with Azure Key Vault, which stores passwords, keys, and secrets for secure access. This article presents best practices for using App Configuration and Key Vault in development and Azure environments.

Use cases

While any application can use Azure App Configuration, the following types of applications benefit most from it:

  • Microservices based on Azure Kubernetes Service, Azure Service Fabric, or other containerized apps deployed in one or more geographies
  • Serverless apps, which include Azure Functions or other event-driven stateless compute apps
  • Apps that use a continuous deployment (CD) pipeline


The following diagrams show how Azure App Configuration and Azure Key Vault can work together to manage and secure apps in Development and Azure environments.

Development environment

In the development environment, the app uses Visual Studio or Azure CLI 2.0 Azure.Identity to sign in and send an authentication request to Azure Active Directory (Azure AD).

Development environment

Azure staging or production environment

The Azure staging and production environments use an Azure Managed Service Identity (MSI) for sign-in and authentication.

Azure environment

Download a Visio file of this architecture.

Data flow

  1. The application sends an authentication request during debugging in Visual Studio, or authenticates via the MSI in Azure.
  2. Upon successful authentication, Azure AD returns an access token.
  3. The App Configuration SDK sends a request with the access token to read the app's App Configuration KeyVault secretURI value for the app's key vault.
  4. Upon successful authorization, App Configuration sends the configuration value.
  5. Using the sign-in identity, the app sends a request to Azure Key Vault to retrieve the application secret for the secretURI that App Configuration sent.
  6. Upon successful authorization, Key Vault returns the secret value.


  • It's best to use a different key vault for each application in each environment: development, Azure pre-production, and Azure production. Using different vaults helps prevent sharing secrets across environments, and reduces the threat in case of a breach.

  • To use these scenarios, the sign-in identity must have the App Configuration Data Reader role in the App Configuration resource, and have explicit access policies for retrieving the secrets in Azure Key Vault.

Next steps