How can we improve Microsoft Azure Functions?

Add binding to Key Vault

Functions often need password, API keys, and connection strings to connect to other services and retrieve data. It would be great if those secrets could easily be obtained from Key Vault.

382 votes
Sign in
Sign in with: oidc
Signed in as (Sign out)

We’ll send you updates on this idea

Anonymous shared this idea  ·   ·  Flag idea as inappropriate…  ·  Admin →
started  ·  AdminAzure Functions team (Product Owner, Microsoft Azure) responded  · 

Hi all,

We’re pleased to announce a public preview of our Key Vault references feature, which you can learn more about here:

There are some limitations to the initial preview, but we’re hoping to address those very soon. We’re looking forward to your feedback!

Thank you,
Matthew, Azure Functions team


Sign in
Sign in with: oidc
Signed in as (Sign out)
  • Srikanth commented  ·   ·  Flag as inappropriate

    It's been more than 6 months now.. Is it still in public preview? This is some thing that can not really wait so long :)

  • Mahesh Nagaiah commented  ·   ·  Flag as inappropriate

    We are looking forward for the General availability dates of this feature. Can you please share the same?

  • Brett Caswell commented  ·   ·  Flag as inappropriate

    is the KeyVaultSample in the github source of Microsoft.Extensions.Configuration package a suitable workaround for this?

    Is your recommendation to still use EnvironmentVariables (as stated in the last paragraph here: )

  • Vinny commented  ·   ·  Flag as inappropriate

    Any news on this feature ? We're using Azure Functions v2 with MSI and accessing secrets within the function works. However, now I require those secrets to also be accessible in the trigger bindings for eventhub and servicebus connections due to security reasons. When can we expect this feature?

  • Anonymous commented  ·   ·  Flag as inappropriate

    Any updates on this. We are using EventHubTrigger in Azure Functions, but it requires binding connection string into local.settings.json whereas we have all our applications migrated to KeyVault secrets. We would like to follow the same approach with Azure Functions but it doesn't seem supported for now. Can you please provide this feature as soon as possible, as already Azure Functions 2.0 (~beta) is already out and in use.

  • Jacque de Kock commented  ·   ·  Flag as inappropriate

    Very high in demand. We often have to over complicate infrastructure to achieve this function. Cannot wait for it to be available.

  • srinivasu commented  ·   ·  Flag as inappropriate

    Please support at the earliest (MSI enabled function and secret Uri in trigger binding)

  • Steve Haeney commented  ·   ·  Flag as inappropriate

    Just to echo what many are saying. Without KeyVault access directly in the bindings, you're unlikely to be able to use Azure Functions with Queues/Topics in the Enterprise.

    Storing the connection string in plain text in the configuration is a no-go

  • Vivek Desai commented  ·   ·  Flag as inappropriate

    Upvoting this request. from the Aug 2016 reply it seems this is being interpreted as a request to add Keyvault as a new binding ("when we’re ready to start adding more bindings"). What is really required to to have existing bindings resolve secrets from a Keyvault configuration source rather than looking to resolve them from json or env variables only.

    The Keyvault + Managed Service Identity is an excellent combination, but without the ability of bindings like cosmosdb, storage table etc to retrieve connection strings from key vault source, it is becoming impossible to use Key vault and MSI for Azure Functions.

  • Tom Castiglia commented  ·   ·  Flag as inappropriate

    Wow, surprised to see this is not supported yet. Hope the Azure App Service Team can respond soon with an update/ETA.

  • Tom Kerkhove commented  ·   ·  Flag as inappropriate

    @Tsahi Whetever you do, do not cache secrets in a persistent cache/storage outside of Key Vault :)

  • Tsahi commented  ·   ·  Flag as inappropriate

    You can always access Key Vault directly from the Key Vault SDK, and even cache the results in Storage Tables if you like. And restrict access to it on a need-to-know basis only.

← Previous 1 3

Feedback and Knowledge Base