Managing User Secrets while developing a .Net Core application


hi,

i migrating .net core application service fabric , within initialization sequence have following code:

        if (env.isdevelopment())
            {
                this.configurationbuilder.addusersecrets();
            }

right now, code failing following:

additional information: unable locate project.json @ 'c:\sfdevcluster\data\_app\_node_4\deploymenttype_app9\managementpkg.code.1.0.0\'.

i did set secret locally on app , if run app in standalone mode, code fetch secrets. in sf, seems looking file in sfdevcluster folder.

what need set secrets locally?

there couple of answer this

first service fabric provides mechanism securing secrets in application can used both development environment , in production described here https://azure.microsoft.com/en-us/documentation/articles/service-fabric-application-secret-management/. similar way asp.net v5 enables embedded secrets in configure. preferred way

the .net core secrets tool using seems specific development environments, not useful when have put code production. hence remove code.

second in azure storing secrets in keyvault idea. described here https://blogs.msdn.microsoft.com/dotnet/2016/10/03/storing-and-using-secrets-in-azure/ in case of secrets stored in configuration service fabric, cert used encrypt secret should stored in keyvault , deployed via arm machine. can of course put secrets in azure keyvault issue being if not want dependency on service may not available , application deployment cannot proceed.


lead program manager, microsoft



Microsoft Azure  >  Azure Service Fabric



Comments

Popular posts from this blog

Azure DocumentDB Owner resource does not exist

job syspolicy_purge_history job fail in sqlserver 2008

Trying to register with public marketplace error with 'Get-AzureStackStampInformation'