Find Key Vaults in Azure faster.
winget install "Key Vault Explorer" --source msstoreDownload from the releases page.
Named 'Key Vault Explorer' in the Microsoft Store.
Visit the releases section to download the application for mac and linux.
Key Vault Explorer is a lightweight tool with the idea to simplify finding and accessing secrets (and certificates and keys) stored in Azure Key Vault, providing a interface for aggregating, filtering, and quickly getting secret values. The app was inspired by the original AzureKeyVaultExplorer with the goal to eventually bring some more feature parity but first brining the application to macOS.
- Signing in with a Microsoft Account See how credentials are secured
- Support to selectively include/exclude subscriptions to show resource groups and key vaults in the tree
- Ability to filter subscriptions, resource groups, and key vaults by name
- Saving vaults to "pinned" section in quick access menu and saving selected subscriptions in SQLite
- Copy secrets to the clipboard using Control+C
- Automatic clearing of clipboard values after a set amount of time (configurable up to 60 seconds)
- Viewing details and tags about values
- Filtering and sorting of values
- Viewing last updates and next to expire values
- Downloading and saving .pfx and .cer files
- Support for custom ClientId and TenantId
- AzureGovernment, AzureChina and AzureGermany Support
- No telemetry or logs collected
- SQLite Database encryption using DPAPI and KeyChain on Mac
The authentication and credentials storage uses Microsoft.Identity.Client.Extensions.Msal library are encrypted and stored with DPAPI on windows, and the keychain on macOS (you may be prompted multiple times to grant rights). The security is pulled directly from this document: https://github.com/AzureAD/microsoft-authentication-extensions-for-dotnet/wiki/Cross-platform-Token-Cache#configuring-the-token-cache
The SQLite database is encrypted using DPAPI on windows, and on macOS the password in the keychain.
Get it from the releases page or the Microsoft Store.
After downloading the .app bundle, macOS may block it because it's from an unidentified developer. To fix this, run:
xattr -cr "/path/to/Key Vault Explorer.app"Then move the app to your Applications folder. You may also need to go to System Settings > Privacy & Security and click "Open Anyway".
After downloading the .exe, Windows may block it (unless you got it from winget or Microsoft Store). Right-click the file, select Properties, and check the "Unblock" checkbox at the bottom, then click OK.
Warning
After downloading for the first time you will need to follow the first time setup guide listed below:
Note
You can use a custom client ID that belongs to Microsoft Azure CLI. This is intended for testing only and is not recommended by the maintainers of this repository, as it may violate Microsoft’s Terms of Service. Doing so can bypass the need for an IT administrator to grant permissions to the application, effectively circumventing the standard consent process. Once done, click save in the settings page and restart the application. See this article for more details on the well-known client ID. https://rakhesh.com/azure/well-known-client-ids/
- Building from source
- Using your own Client ID / Tenant ID
- First time Azure Tenant setup
- Troubleshooting
Installer built with: Master Packager Dev