Prerequisites:

  • Set up and add envars to Infisical Cloud.
  • Set up Azure and have an existing App Configuration instance.
  • User setting up the integration on Infisical must have the App Configuration Data Owner role for the intended Azure App Configuration instance.
  • Azure App Configuration instance must be reachable by Infisical.
1

Authorize Infisical for Azure App Configuration

Navigate to your project’s integrations tab

Press on the Azure App Configuration tile and grant Infisical access to App Configuration.

2

Start integration

Obtain the Azure App Configuration endpoint from the overview tab.

Select which Infisical environment secrets you want to sync to your Azure App Configuration. Then, input your App Configuration instance endpoint. Optionally, you can define a prefix for your secrets which will be appended to the keys upon syncing.

Press create integration to start syncing secrets to Azure App Configuration.

The Azure App Configuration integration requires the following permissions to be set on the user / service principal for Infisical to sync secrets to Azure App Configuration: Read Key-Value, Write Key-Value, Delete Key-Value.

Any role with these permissions would work such as the App Configuration Data Owner role. Alternatively, you can use the App Configuration Data Reader role for read-only access or App Configuration Data Contributor role for read/write access.

3

Additional Configuration

Azure references

When adding secrets in Infisical that reference Azure Key Vault secrets, Infisical will automatically sets the content type to application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8 in Azure App Configuration. The following reference formats are automatically detected when added on Infisical’s side:

  • { "uri": "https://my-key-vault.vault.azure.net/secrets/my-secret" }
  • https://my-key-vault.vault.azure.net/secrets/my-secret

Azure Labels

You can sync secrets from Infisical to Azure with custom labels by enabling the Use Labels option during setup:

When enabled: Secrets will be pushed to Azure with your specified label

When disabled: Secrets will be pushed with an empty (null) label

If you have set the initial sync to import have behavior, the label selection affects which secrets are imported from Azure:

  • With Use Labels disabled: Only secrets with empty labels are imported on initial sync
  • With Use Labels enabled: Only secrets matching your specified label are imported on initial sync