Skip to content

Latest commit

 

History

History
223 lines (137 loc) · 9.38 KB

quick-create-python.md

File metadata and controls

223 lines (137 loc) · 9.38 KB
title description author ms.author ms.date ms.service ms.subservice ms.topic ms.devlang ms.custom
Quickstart – Azure Key Vault Python client library – manage keys
Learn how to create, retrieve, and delete keys from an Azure key vault using the Python client library
msmbaldwin
mbaldwin
02/03/2023
key-vault
keys
quickstart
python
devx-track-python, devx-track-azurecli, mode-api, passwordless-python

Quickstart: Azure Key Vault keys client library for Python

Get started with the Azure Key Vault client library for Python. Follow these steps to install the package and try out example code for basic tasks. By using Key Vault to store cryptographic keys, you avoid storing such keys in your code, which increases the security of your app.

API reference documentation | Library source code | Package (Python Package Index)

Prerequisites

This quickstart assumes you're running Azure CLI or Azure PowerShell in a Linux terminal window.

Set up your local environment

This quickstart is using the Azure Identity library with Azure CLI or Azure PowerShell to authenticate the user to Azure services. Developers can also use Visual Studio or Visual Studio Code to authenticate their calls. For more information, see Authenticate the client with Azure Identity client library.

Sign in to Azure

  1. Run the login command.

    az login
    

    If the CLI can open your default browser, it will do so and load an Azure sign-in page.

    Otherwise, open a browser page at https://aka.ms/devicelogin and enter the authorization code displayed in your terminal.

  2. Sign in with your account credentials in the browser.

  1. Run the Connect-AzAccount command.

    Connect-AzAccount
    

    If PowerShell can open your default browser, it will do so and load an Azure sign-in page.

    Otherwise, open a browser page at https://aka.ms/devicelogin and enter the authorization code displayed in your terminal.

  2. Sign in with your account credentials in the browser.


Install the packages

  1. In a terminal or command prompt, create a suitable project folder, and then create and activate a Python virtual environment as described on Use Python virtual environments.

  2. Install the Microsoft Entra identity library:

    pip install azure-identity
    
  3. Install the Key Vault key client library:

    pip install azure-keyvault-keys
    

Create a resource group and key vault

[!INCLUDE Create a resource group and key vault]

Set the KEY_VAULT_NAME environmental variable

[!INCLUDE Set the KEY_VAULT_NAME environmental variable]

Grant access to your key vault

[!INCLUDE Using RBAC to provide access to a key vault]

Create the sample code

The Azure Key Vault key client library for Python allows you to manage cryptographic keys. The following code sample demonstrates how to create a client, set a key, retrieve a key, and delete a key.

Create a file named kv_keys.py that contains this code.

import os
from azure.keyvault.keys import KeyClient
from azure.identity import DefaultAzureCredential

keyVaultName = os.environ["KEY_VAULT_NAME"]
KVUri = "https://" + keyVaultName + ".vault.azure.net"

credential = DefaultAzureCredential()
client = KeyClient(vault_url=KVUri, credential=credential)

keyName = input("Input a name for your key > ")

print(f"Creating a key in {keyVaultName} called '{keyName}' ...")

rsa_key = client.create_rsa_key(keyName, size=2048)

print(" done.")

print(f"Retrieving your key from {keyVaultName}.")

retrieved_key = client.get_key(keyName)

print(f"Key with name '{retrieved_key.name}' was found.")
print(f"Deleting your key from {keyVaultName} ...")

poller = client.begin_delete_key(keyName)
deleted_key = poller.result()

print(" done.")

Run the code

Make sure the code in the previous section is in a file named kv_keys.py. Then run the code with the following command:

python kv_keys.py

Rerunning the code with the same key name may produce the error, "(Conflict) Key <name> is currently in a deleted but recoverable state." Use a different key name.

Code details

Authenticate and create a client

Application requests to most Azure services must be authorized. Using the DefaultAzureCredential class provided by the Azure Identity client library is the recommended approach for implementing passwordless connections to Azure services in your code. DefaultAzureCredential supports multiple authentication methods and determines which method should be used at runtime. This approach enables your app to use different authentication methods in different environments (local vs. production) without implementing environment-specific code.

In this quickstart, DefaultAzureCredential authenticates to key vault using the credentials of the local development user logged into the Azure CLI. When the application is deployed to Azure, the same DefaultAzureCredential code can automatically discover and use a managed identity that is assigned to an App Service, Virtual Machine, or other services. For more information, see Managed Identity Overview.

In the example code, the name of your key vault is expanded using the value of the KVUri variable, in the format: "https://<your-key-vault-name>.vault.azure.net".

credential = DefaultAzureCredential()
client = KeyClient(vault_url=KVUri, credential=credential)

Save a key

Once you've obtained the client object for the key vault, you can store a key using the create_rsa_key method:

rsa_key = client.create_rsa_key(keyName, size=2048)

You can also use create_key or create_ec_key.

Calling a create method generates a call to the Azure REST API for the key vault.

When Azure handles the request, it authenticates the caller's identity (the service principal) using the credential object you provided to the client.

Retrieve a key

To read a key from Key Vault, use the get_key method:

retrieved_key = client.get_key(keyName)

You can also verify that the key has been set with the Azure CLI command az keyvault key show or the Azure PowerShell cmdlet Get-AzKeyVaultKey.

Delete a key

To delete a key, use the begin_delete_key method:

poller = client.begin_delete_key(keyName)
deleted_key = poller.result()

The begin_delete_key method is asynchronous and returns a poller object. Calling the poller's result method waits for its completion.

You can verify that the key is deleted with the Azure CLI command az keyvault key show or the Azure PowerShell cmdlet Get-AzKeyVaultKey.

Once deleted, a key remains in a deleted but recoverable state for a time. If you run the code again, use a different key name.

Clean up resources

If you want to also experiment with certificates and secrets, you can reuse the Key Vault created in this article.

Otherwise, when you're finished with the resources created in this article, use the following command to delete the resource group and all its contained resources:

az group delete --resource-group myResourceGroup
Remove-AzResourceGroup -Name myResourceGroup

Next steps