Skip to content

cricketthomas/AzureKeyVaultExplorer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

121 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Azure Key Vault Explorer

Find Key Vaults in Azure faster.

Install via Winget (Windows)

winget install "Key Vault Explorer" --source msstore

macOS and Linux

Download from the releases page.

Named 'Key Vault Explorer' in the Microsoft Store.

Overview

Visit the releases section to download the application for mac and linux.

Key Vault Explorer is a lightweight tool with the idea to simplify finding and accessing secrets (and certificates and keys) stored in Azure Key Vault, providing a interface for aggregating, filtering, and quickly getting secret values. The app was inspired by the original AzureKeyVaultExplorer with the goal to eventually bring some more feature parity but first brining the application to macOS.

Key features

  • Signing in with a Microsoft Account See how credentials are secured
  • Support to selectively include/exclude subscriptions to show resource groups and key vaults in the tree
  • Ability to filter subscriptions, resource groups, and key vaults by name
  • Saving vaults to "pinned" section in quick access menu and saving selected subscriptions in SQLite
  • Copy secrets to the clipboard using Control+C
  • Automatic clearing of clipboard values after a set amount of time (configurable up to 60 seconds)
  • Viewing details and tags about values
  • Filtering and sorting of values
  • Viewing last updates and next to expire values
  • Downloading and saving .pfx and .cer files
  • Support for custom ClientId and TenantId
  • AzureGovernment, AzureChina and AzureGermany Support

Privacy Features

  • No telemetry or logs collected
  • SQLite Database encryption using DPAPI and KeyChain on Mac

Security

The authentication and credentials storage uses Microsoft.Identity.Client.Extensions.Msal library are encrypted and stored with DPAPI on windows, and the keychain on macOS (you may be prompted multiple times to grant rights). The security is pulled directly from this document: https://github.com/AzureAD/microsoft-authentication-extensions-for-dotnet/wiki/Cross-platform-Token-Cache#configuring-the-token-cache

The SQLite database is encrypted using DPAPI on windows, and on macOS the password in the keychain.

Screenshots

image Screenshot 2026-03-18 at 7 21 15 PM

Download

Get it from the releases page or the Microsoft Store.

macOS

After downloading the .app bundle, macOS may block it because it's from an unidentified developer. To fix this, run:

xattr -cr "/path/to/Key Vault Explorer.app"

Then move the app to your Applications folder. You may also need to go to System Settings > Privacy & Security and click "Open Anyway".

Windows

After downloading the .exe, Windows may block it (unless you got it from winget or Microsoft Store). Right-click the file, select Properties, and check the "Unblock" checkbox at the bottom, then click OK.

Setting up the application:

Warning

After downloading for the first time you will need to follow the first time setup guide listed below:

Azure CLI

Note

You can use a custom client ID that belongs to Microsoft Azure CLI. This is intended for testing only and is not recommended by the maintainers of this repository, as it may violate Microsoft’s Terms of Service. Doing so can bypass the need for an IT administrator to grant permissions to the application, effectively circumventing the standard consent process. Once done, click save in the settings page and restart the application. See this article for more details on the well-known client ID. https://rakhesh.com/azure/well-known-client-ids/

image

Documentation

Acknowledgements

Installer built with: Master Packager Dev

Dependencies