A step-by-step operational guide for integrating Delinea Secret Server with Azure Key Vault — covering identity setup, vault bridging, and secret synchronization.
Microsoft Entra ID → App registrationsCertificates & secrets → Client secrets → New client secretAccess control (IAM) → Add role assignmentAdministration → External Secrets (under the Integration section)Prod-VM-Admin-Pass| Step | Action | Key Detail |
|---|---|---|
| 1A — Register App | Create App Registration in Microsoft Entra ID | Account type: this organizational directory only |
| 1B — Credentials | Generate Client Secret under Certificates & Secrets | Copy value immediately — only visible once |
| 1C — RBAC | Assign role to App Registration on Key Vault | Role: Key Vault Secrets Officer (write access required) |
| 2A — Connection Secret | Create secret in Delinea using Azure App Registration template | Inputs: Client ID, Tenant ID, Secret Value |
| 2B — Vault Link | Create External Vault Link in Administration → External Secrets | Provider: Azure Key Vault; select target vault |
| 3A — Mapping | Add External Secret, define secret name in Azure | Example name: Prod-VM-Admin-Pass |
| 3B — Field Map | Map Delinea Password → Azure KV Value | Username can optionally be added as a Secret Tag |
| 3C — Verify | Check Azure Portal → Key Vault → Secrets | Confirm secret name exists and value matches |
You've successfully completed the Azure Key Vault external secrets integration training. You're ready to configure and manage this integration in production.