I am using Azure Portal UI to create a Windows Virtual Machine in Azure.
I created a secret adminpass
in Azure keyvault that specifies the administrator password for the VM to be created.
When it comes to use that adminpass
secret while creating the VM, there are tutorials that describes how to do that if you are creating the VM using an ARM Template:
Securely Deploy Azure VM With Local Admin Password from Azure Key Vault and not in ARM Template
But how can i use that keyvault secret if i am creating the VM using Azure portal UI? Is that possible?
And, is there any benefit (other than security) in specifying the password as secret instead of raw text? I mean, If we add the Windows user accounts in a KeyVault, is it possible that we can easily modify or revoke access to VM when needed?
EDIT :
Is KeyVault secret directly binded to a VM ? I mean, If I modify the VM password's secret value in KeyVault, that doesn't automatically change the password of the VM just beacuse it used the secret during deployment time. What would actually happen is, the applications which reads the keyvault to get credentials to authenticate to the VM, will get a wrong crendetials and auth will fail. Right?
Here are 2 deployment scenarios:
Create a VM via Azure portal UI by specifying the Admin username and password there itself, and after the VM is deployed, just adding the credentials to keyvault secret so that other applications can use them.
First, add credentials to Keyvault secret, and then deployed VM via ARM templates which uses that secret to read VM Admin credentials.
I just want to make sure that, in both cases, the keyvault secret is intended to be used by other applications that want to authenticate the VM. And, from the perspective of the VM, it reads the keyvault only when the VM is created. Am i correct here?