Client Secret¶
The following example uses the ClientSecretCredential to load the credentials.
Worker Configuration¶
Add the following configuration to your Connect worker config file to enable this ConfigProvider to be used by connectors.
#
#Thu May 27 21:15:25 UTC 2021
config.providers.keyVault.param.vault.url=https\://example.vault.azure.net/
config.providers.keyVault.param.credential.type=ClientSecret
config.providers.keyVault.param.client.secret=asdonfasodfasd
config.providers=keyVault
config.providers.keyVault.param.tenant.id=27e831e4-5cff-4143-b612-64de151b2f3e
config.providers.keyVault.class=com.github.jcustenborder.kafka.config.azure.KeyVaultConfigProvider
Connector Configuration¶
Add the following configurations to your connector configuration when you would like to retrieve a value from the config provider
{
"username" : "${keyVault:mysql-connector:username}",
"password" : "${keyVault:mysql-connector:password}"
}