Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
I have deleted the contents of this post as it demonstrated how to use clientID and clientSecret to obtain an AzureAD access token to Key Vault. This is not the correct guidance, your solution should leverage the Managed Service Identity feature of Azure AD or use certificates to authenticate to Azure AD in order to access Key Vault.
For more information:
https://azure.microsoft.com/en-us/resources/samples/app-service-msi-keyvault-dotnet/
https://docs.microsoft.com/en-us/azure/active-directory/msi-tutorial-windows-vm-access-nonaad