Azure Key Vault
Import Secrets
Overview
- Introduction
- Authentication
- Examples
Endpoints
- Identities
- Token Auth
- Universal Auth
- GCP Auth
- AWS Auth
- Azure Auth
- Kubernetes Auth
- OIDC Auth
- JWT Auth
- Groups
- Organizations
- Projects
- Project Users
- Project Groups
- Project Identities
- Project Roles
- Project Templates
- Environments
- Folders
- Secret Tags
- Secrets
- Dynamic Secrets
- Secret Imports
- Secret Rotations
- Identity Specific Privilege
- App Connections
- Secret Syncs
- GETList
- GETOptions
- AWS Parameter Store
- AWS Secrets Manager
- Azure App Configuration
- Azure Key Vault
- Camunda
- Databricks
- GCP Secret Manager
- GitHub
- Hashicorp Vault
- Humanitec
- TeamCity
- Terraform Cloud
- Vercel
- Windmill
- GET
- Integrations
- Service Tokens
- Audit Logs
Infisical PKI
- Certificate Authorities
- Certificates
- Certificate Templates
- Certificate Collections
- PKI Alerting
Infisical SSH
- Hosts
- Host Groups
- Certificates
- Certificate Authorities
- Certificate Templates
Infisical KMS
- Keys
- Encryption
- Signing
Azure Key Vault
Import Secrets
Import secrets from the specified Azure Key Vault Sync destination.
POST
/
api
/
v1
/
secret-syncs
/
azure-key-vault
/
{syncId}
/
import-secrets
curl --request POST \
--url https://us.infisical.com/api/v1/secret-syncs/azure-key-vault/{syncId}/import-secrets
{
"secretSync": {
"id": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"name": "<string>",
"description": "<string>",
"isAutoSyncEnabled": true,
"version": 1,
"projectId": "<string>",
"folderId": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"connectionId": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"createdAt": "2023-11-07T05:31:56Z",
"updatedAt": "2023-11-07T05:31:56Z",
"syncStatus": "<string>",
"lastSyncJobId": "<string>",
"lastSyncMessage": "<string>",
"lastSyncedAt": "2023-11-07T05:31:56Z",
"importStatus": "<string>",
"lastImportJobId": "<string>",
"lastImportMessage": "<string>",
"lastImportedAt": "2023-11-07T05:31:56Z",
"removeStatus": "<string>",
"lastRemoveJobId": "<string>",
"lastRemoveMessage": "<string>",
"lastRemovedAt": "2023-11-07T05:31:56Z",
"syncOptions": {
"initialSyncBehavior": "overwrite-destination",
"disableSecretDeletion": true
},
"connection": {
"app": "azure-key-vault",
"name": "<string>",
"id": "3c90c3cc-0d44-4b50-8888-8dd25736052a"
},
"environment": {
"slug": "<string>",
"name": "<string>",
"id": "3c90c3cc-0d44-4b50-8888-8dd25736052a"
},
"folder": {
"id": "<string>",
"path": "<string>"
},
"destination": "azure-key-vault",
"destinationConfig": {
"vaultBaseUrl": "<string>"
}
}
}
Path Parameters
The ID of the Azure Key Vault Sync to trigger importing secrets for.
Query Parameters
Specify whether Infisical should prioritize secret values from Infisical or Azure Key Vault.
Available options:
prioritize-source
, prioritize-destination
Response
200
application/json
Default Response
The response is of type object
.
Was this page helpful?
curl --request POST \
--url https://us.infisical.com/api/v1/secret-syncs/azure-key-vault/{syncId}/import-secrets
{
"secretSync": {
"id": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"name": "<string>",
"description": "<string>",
"isAutoSyncEnabled": true,
"version": 1,
"projectId": "<string>",
"folderId": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"connectionId": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"createdAt": "2023-11-07T05:31:56Z",
"updatedAt": "2023-11-07T05:31:56Z",
"syncStatus": "<string>",
"lastSyncJobId": "<string>",
"lastSyncMessage": "<string>",
"lastSyncedAt": "2023-11-07T05:31:56Z",
"importStatus": "<string>",
"lastImportJobId": "<string>",
"lastImportMessage": "<string>",
"lastImportedAt": "2023-11-07T05:31:56Z",
"removeStatus": "<string>",
"lastRemoveJobId": "<string>",
"lastRemoveMessage": "<string>",
"lastRemovedAt": "2023-11-07T05:31:56Z",
"syncOptions": {
"initialSyncBehavior": "overwrite-destination",
"disableSecretDeletion": true
},
"connection": {
"app": "azure-key-vault",
"name": "<string>",
"id": "3c90c3cc-0d44-4b50-8888-8dd25736052a"
},
"environment": {
"slug": "<string>",
"name": "<string>",
"id": "3c90c3cc-0d44-4b50-8888-8dd25736052a"
},
"folder": {
"id": "<string>",
"path": "<string>"
},
"destination": "azure-key-vault",
"destinationConfig": {
"vaultBaseUrl": "<string>"
}
}
}