Store sensitive variable values in Azure Key Vault
So sensitive project variables will be referenced from Azure Key Vault instead of being stored in octopus.
https://azure.microsoft.com/en-us/services/key-vault
3357461 - 'Azure Resource Manager Key Vault support' was only about ARM template Key Vault support.
17973586 - 'Integrate Octopus deploy with secrets managment system Vault' is similar to this issue only for https://www.vaultproject.io
This idea is similar to
https://docs.microsoft.com/en-us/vsts/build-release/concepts/library/variable-groups?view=vsts#link-secrets-from-an-azure-key-vault-as-variables

-
Pedro Luz commented
This is high priority given the community scripts for KeyVault are very faulty :(
-
Elliot Pryde commented
+1 for Azure Key Vault integration
-
Matt B commented
+1 for AWS SecretsManager
-
Dan Greene commented
+1 for AWS SecretsManager
-
Al commented
The ability to keep secrets in a secure cloud location, integrated in Octopus, and be able to write them during deployment (say your terraform step created a database and you need to save the connection string) as well as read them/apply them to apps would be great.
-
Eric S commented
+1 for AWS SecretsManager
-
Keith D commented
Would be great to see some integration with external secrets management, we're about to start using Thycotic
-
Richard Nagle commented
Also please support AWS Secrets Manager
-
Rob commented
+1 for Azure Key Vault integration
-
Raf commented
would be great to see azure key vault integration
-
Greg Lloyd commented
This would greatly beneficial for our deployments as it provides a secure way access and version related secrets and configurations.
-
Andris commented
+1 for Azure Key Vault integration
-
Arjan van Rijn commented
Same goes for Azure Key Vault
-
Darren Aitcheson commented
Second this - integration with Vault (also the Hashicorp Enterprise version) and also CyberArk would be very useful.
-
Eric Loveland commented
This was also suggested here: https://github.com/OctopusDeploy/Issues/issues/3093#issuecomment-275559590
I would like to see this implemented as an extensibility point however. Other secrets management systems such as Thycotic Secret Server, ManageEngine Password Manager, Square KeyWhiz and any variety of on-prem and cloud HSMszure are in use throughout our industry.
Initially I thought that this could be implemented via an Octostache extensibility point (a plugin that helps it fetch sensitive vars) but I realized this would not be compatible with offline deployments.
-
Andry commented
Integrate Octopus Deploy with HashiCorp Vault secrets management system