Skip to content

Latest commit

 

History

History
42 lines (31 loc) · 1.66 KB

protect-secrets.md

File metadata and controls

42 lines (31 loc) · 1.66 KB
description ms.custom ms.devlang ms.service ms.topic title
Strategies to manage, protect, and prevent inadvertent exposure of secrets and sensitive information in Azure PowerShell.
devx-track-azurepowershell
powershell
azure-powershell
conceptual
Protect secrets in Azure PowerShell

Protect secrets in Azure PowerShell

When you manage Azure resources with Azure PowerShell, the output of commands might expose sensitive information that you must protect. For example, Azure PowerShell could display passwords, tokens, or keys in the output when you create them. Some commands can also store the output in log files. This scenario is often the case when working with GitHub Actions or Azure DevOps.

Understand the risk

It's critical to protect secrets and sensitive information. When mishandled, they can become accessible to unauthorized users. User errors, such as improperly configured scripts or entering secrets in plain text as values for parameters, can expose sensitive details in logs, command history, or version control systems.

Warning message

Azure PowerShell displays a warning message by default beginning with version 12.0.0 to help you protect sensitive information when it identifies a potential secret in the output of a command.

Disable the warning message

In the following example, the Update-AzConfig cmdlet is used to disable the warning message.

Update-AzConfig -DisplaySecretsWarning $false

You can also use the $Env:AZURE_CLIENTS_SHOW_SECRETS_WARNING environment variable to disable the warning message.

Set-Item -Path Env:\AZURE_CLIENTS_SHOW_SECRETS_WARNING -Value $false