Client Secret

The following example uses the ClientSecretCredential to load the credentials.

Worker Configuration

Add the following configuration to your Connect worker config file to enable this ConfigProvider to be used by connectors.

Worker Configuration
#
#Thu May 27 21:15:25 UTC 2021
config.providers.keyVault.param.vault.url=https\://example.vault.azure.net/
config.providers.keyVault.param.credential.type=ClientSecret
config.providers.keyVault.param.client.secret=asdonfasodfasd
config.providers=keyVault
config.providers.keyVault.param.tenant.id=27e831e4-5cff-4143-b612-64de151b2f3e
config.providers.keyVault.class=com.github.jcustenborder.kafka.config.azure.KeyVaultConfigProvider

Connector Configuration

Add the following configurations to your connector configuration when you would like to retrieve a value from the config provider

Connector Configuration
{
  "username" : "${keyVault:mysql-connector:username}",
  "password" : "${keyVault:mysql-connector:password}"
}