Add Key Vault to your web application by using Visual Studio Connected Services

In this tutorial, you will learn how to easily add everything you need to start using Azure Key Vault to manage your secrets for web projects in Visual Studio, whether you are using ASP.NET Core or any type of ASP.NET project. By using the Connected Services feature in Visual Studio 2017, you can have Visual Studio automatically add all the NuGet packages and configuration settings you need to connect to Key Vault in Azure.

For details on the changes that Connected Services makes in your project to enable Key Vault, see Key Vault Connected Service - What happened to my ASP.NET 4.7.1 project or Key Vault Connected Service - What happened to my ASP.NET Core project.


  • An Azure subscription. If you do not have one, you can sign up for a free account.
  • Visual Studio 2017 version 15.7 with the Web Development workload installed. Download it now.
  • For ASP.NET (not Core), you need the .NET Framework 4.7.1 Development Tools, which are not installed by default. To install them, launch the Visual Studio Installer, choose Modify, and then choose Individual Components, then on the right-hand side, expand ASP.NET and web development, and choose .NET Framework 4.7.1 Development Tools.
  • An ASP.NET 4.7.1 or ASP.NET Core 2.0 web project open.

Add Key Vault support to your project

  1. In Solution Explorer, choose Add > Connected Service. The Connected Service page appears with services you can add to your project.
  2. In the menu of available services, choose Secure Secrets With Azure Key Vault.

    Choose "Secure Secrets With Azure Key Vault"

    If you've signed into Visual Studio, and have an Azure subscription associated with your account, a page appears with a dropdown list with your subscriptions. Make sure that you're signed into Visual Studio, and that the account you're signed in with is the same account that you use for your Azure subscription.

  3. Select the subscription you want to use, and then choose a new or existing Key Vault, or choose the Edit link to modify the automatically generated name.

    Select your subscription

  4. Type the name you want to use for the Key Vault.

    Rename the Key Vault and choose a resource group

  5. Select an existing Resource Group, or choose to create a new one with an automatically generated unqiue name. If you want to create a new group with a different name, you can use the Azure Portal, and then close the page and restart to reload the list of resource groups.

  6. Choose the region in which to create the Key Vault. If your web application is hosted in Azure, choose the region that hosts the web application for optimum performance.
  7. Choose a pricing model. For details, see Key Vault Pricing.
  8. Choose OK to accept the configuration choices.
  9. Choose Add to create the Key Vault. The create process might fail if you choose a name that was already used. If that happens, use the Edit link to rename the Key Vault and try again.

    Adding connected service to project

  10. Now, add a secret in your Key Vault in Azure. To get to the right place in the portal, click on the link for Manage secrets stored in this Key Vault. If you closed the page or the project, you can navigate to it in the Azure portal by choosing All Services, under Security, choose Key Vault, then choose the Key Vault you created.

    Navigating to the portal

  11. In the Key Vault section for the key vault you created, choose Secrets, then Generate/Import.

    Generate/Import a secret

  12. Enter a secret, such as "MySecret" and give it any string value as a test, then choose the Create button.

    Create a secret

  13. (optional) Enter another secret, but this time put it into a category by naming it "Secrets--MySecret". This syntax specifies a category "Secrets" that contains a secret "MySecret."

Now, you can access your secrets in code. The next steps are different depending on whether you are using ASP.NET 4.7.1 or ASP.NET Core.

Access your secrets in code

  1. Install these two nuget packages AppAuthentication and KeyVault NuGet libraries.

  2. Open Program.cs file and update the code with the following code:

     public class Program
         public static void Main(string[] args)
         public static IWebHost BuildWebHost(string[] args) =>
                .ConfigureAppConfiguration((ctx, builder) =>
                    var keyVaultEndpoint = GetKeyVaultEndpoint();
                    if (!string.IsNullOrEmpty(keyVaultEndpoint))
                        var azureServiceTokenProvider = new AzureServiceTokenProvider();
                        var keyVaultClient = new KeyVaultClient(
                            new KeyVaultClient.AuthenticationCallback(
                            keyVaultEndpoint, keyVaultClient, new DefaultKeyVaultSecretManager());
         private static string GetKeyVaultEndpoint() => "https://<YourKeyVaultName>";
  3. Next open About.cshtml.cs file and write the following code
    1. Include a reference to Microsoft.Extensions.Configuration by this using statement
      using Microsoft.Extensions.Configuration
    2. Add this constructor public AboutModel(IConfiguration configuration) { _configuration = configuration; }
    3. Update the OnGet method. Update the placeholder value shown here with the secret name you created in the above commands public void OnGet() { //Message = "Your application description page."; Message = "My key val = " + _configuration["<YourSecretNameThatWasCreatedAbove>"]; }

Run the app locally by browsing to About page. You should your secret value retrieved

Clean up resources

When no longer needed, delete the resource group. This deletes the Key Vault and related resources. To delete the resource group through the portal:

  1. Enter the name of your resource group in the Search box at the top of the portal. When you see the resource group used in this QuickStart in the search results, select it.
  2. Select Delete resource group.
  3. In the TYPE THE RESOURCE GROUP NAME: box type in the name of the resource group and select Delete.

Next steps

Learn more about Key Vault development by reading the Key Vault Developer's Guide