Back to Infisical

Azure Entra Id

docs/documentation/platform/dynamic-secrets/azure-entra-id.mdx

0.159.255.7 KB
Original Source

The Infisical Azure Entra Id dynamic secret allows you to generate Azure Entra Id credentials on demand based on configured role.

Prerequisites

<Steps> <Step> Login to [Microsoft Entra ID](https://entra.microsoft.com/) </Step> <Step> Go to Overview, Copy and store `Tenant Id` ![Copy Tenant Id](../../../images/platform/dynamic-secrets/dynamic-secret-ad-tenant-id.png) </Step> <Step> Go to Applications > App registrations. Click on New Registration. ![Copy Tenant Id](../../../images/platform/dynamic-secrets/dynamic-secret-ad-new-registration.png) </Step> <Step> Enter an application name. Click Register. </Step> <Step> Copy and store `Application Id`. ![Copy Application Id](../../../images/platform/dynamic-secrets/dynamic-secret-ad-copy-app-id.png) </Step> <Step> Go to Clients and Secrets. Click on New Client Secret. </Step> <Step> Enter a description, select expiry and click Add. </Step> <Step> Copy and store `Client Secret` value. ![Copy client Secret](../../../images/platform/dynamic-secrets/dynamic-secret-ad-add-client-secret.png) </Step> <Step> Go to API Permissions. Click on Add a permission. ![Click add a permission](../../../images/platform/dynamic-secrets/dynamic-secret-ad-add-permission.png) </Step> <Step> Click on Microsoft Graph. ![Click Microsoft Graph](../../../images/platform/dynamic-secrets/dynamic-secret-ad-select-graph.png) </Step> <Step> Click on Application Permissions. Search and select `User.ReadWrite.All` and click Add permissions. ![Add User.Read.All](../../../images/platform/dynamic-secrets/dynamic-secret-ad-select-perms.png) </Step> <Step> Click on Grant admin consent for app. Click yes to confirm. ![Grant admin consent](../../../images/platform/dynamic-secrets/dynamic-secret-ad-admin-consent.png) </Step> <Step> Go to Dashboard. Click on show more. ![Show more](../../../images/platform/dynamic-secrets/dynamic-secret-ad-show-more.png) </Step> <Step> Click on Roles & admins. Search for User Administrator and click on it. ![User Administrator](../../../images/platform/dynamic-secrets/dynamic-secret-ad-user-admin.png) </Step> <Step> Click on Add assignments. Search for the application name you created and select it. Click on Add. ![Add assignments](../../../images/platform/dynamic-secrets/dynamic-secret-ad-add-assignments.png) </Step> </Steps>

Set up Dynamic Secrets with Azure Entra ID

<Steps> <Step title="Open Secret Overview Dashboard"> Open the Secret Overview dashboard and select the environment in which you would like to add a dynamic secret. </Step> <Step title="Click on the 'Add Dynamic Secret' button"> ![Add Dynamic Secret Button](../../../images/platform/dynamic-secrets/add-dynamic-secret-button.png) </Step> <Step title="Select 'Azure Entra ID'"> ![Dynamic Secret Modal](../../../images/platform/dynamic-secrets/dynamic-secret-ad-modal.png) </Step> <Step title="Provide the inputs for dynamic secret parameters"> <ParamField path="Secret Prefix" type="string" required> Prefix for the secrets to be created </ParamField>
<ParamField path="Default TTL" type="string" required>
	Default time-to-live for a generated secret (it is possible to modify this value after a secret is generated)
</ParamField>

<ParamField path="Max TTL" type="string" required>
	Maximum time-to-live for a generated secret.
</ParamField>

<ParamField path="Tenant ID" type="string" required>
	The Tenant ID of your Azure Entra ID account.
</ParamField>

<ParamField path="Application ID" type="string" required>
	The Application ID of the application you created in Azure Entra ID.
</ParamField>

<ParamField path="Client Secret" type="string" required>
	The Client Secret of the application you created in Azure Entra ID.
</ParamField>

<ParamField path="Users" type="selection" required>
	Multi select list of users to generate secrets for.
</ParamField>
</Step> <Step title="Click `Submit`"> After submitting the form, you will see a dynamic secret for each user created in the dashboard. </Step> <Step title="Generate dynamic secrets"> Once you've successfully configured the dynamic secret, you're ready to generate on-demand credentials. To do this, simply click on the 'Generate' button which appears when hovering over the dynamic secret item. Alternatively, you can initiate the creation of a new lease by selecting 'New Lease' from the dynamic secret lease list section.
![Dynamic Secret](/images/platform/dynamic-secrets/dynamic-secret-generate.png)
![Dynamic Secret](/images/platform/dynamic-secrets/dynamic-secret-lease-empty.png)

When generating these secrets, it's important to specify a Time-to-Live (TTL) duration. This will dictate how long the credentials are valid for.

![Provision Lease](/images/platform/dynamic-secrets/provision-lease.png)

<Tip>
	Ensure that the TTL for the lease falls within the maximum TTL defined when configuring the dynamic secret.
</Tip>


Once you click the `Submit` button, a new secret lease will be generated and the credentials from it will be shown to you.

![Provision Lease](/images/platform/dynamic-secrets/dynamic-secret-ad-lease.png)
</Step> </Steps>

Audit or Revoke Leases

Once you have created one or more leases, you will be able to access them by clicking on the respective dynamic secret item on the dashboard. This will allow you to see the expiration time of the lease or delete a lease before its set time to live.

Renew Leases

To extend the life of the generated dynamic secret leases past its initial time to live, simply click on the Renew button as illustrated below.

<Warning> Lease renewals cannot exceed the maximum TTL set when configuring the dynamic secret </Warning>