| page_type | sample | |
|---|---|---|
| languages |
|
|
| products |
|
|
| name | Enable Server and Client SSL from Azure Key Vault SSL Bundles in Spring Boot Application | |
| description | This sample demonstrates how to enable Server and Client SSL via Azure KeyVault SSL bundles in Spring Boot application. |
This sample demonstrates how to enable Server and RestTemplate SSL via Azure KeyVault SSL bundles in Spring Boot web application.
You will build an application that use spring-cloud-azure-starter-keyvault-jca to retrieve certificates from multiple Azure Key Vault.
- An Azure subscription
- Terraform
- Azure CLI
- JDK 17 or later
- Maven
- You can also import the code straight into your IDE:
Terraform must authenticate to Azure to create infrastructure.
In your terminal, use the Azure CLI tool to setup your account permissions locally.
az loginYour browser window will open and you will be prompted to enter your Azure login credentials. After successful authentication, your terminal will display your subscription information. You do not need to save this output as it is saved in your system for Terraform to use.
You have logged in. Now let us find all the subscriptions to which you have access...
[
{
"cloudName": "AzureCloud",
"homeTenantId": "home-Tenant-Id",
"id": "subscription-id",
"isDefault": true,
"managedByTenants": [],
"name": "Subscription-Name",
"state": "Enabled",
"tenantId": "0envbwi39-TenantId",
"user": {
"name": "your-username@domain.com",
"type": "user"
}
}
]If you have more than one subscription, specify the subscription-id you want to use with command below:
az account set --subscription <your-subscription-id>After login Azure CLI with your account, now you can use the terraform script to create Azure Resources.
# In the root directory of the sample
# Initialize your Terraform configuration
terraform -chdir=./terraform init
# Apply your Terraform Configuration
terraform -chdir=./terraform apply -auto-approve
# In the root directory of the sample
# Initialize your Terraform configuration
terraform -chdir=terraform init
# Apply your Terraform Configuration
terraform -chdir=terraform apply -auto-approve
It may take a few minutes to run the script. After successful running, you will see prompt information like below:
...
azurecaf_name.azurecaf_name_kv_01: Creating...
azurecaf_name.azurecaf_name_kv_02: Creating...
azurecaf_name.resource_group: Creating...
azurecaf_name.azurecaf_name_kv_01: Creation complete after 0s [id=tsnjmjbuwvumasse]
azurecaf_name.resource_group: Creation complete after 0s [id=ddeodontheybkwgm]
azurecaf_name.azurecaf_name_kv_02: Creation complete after 0s [id=tsnjmjbuwvumasse]
azuread_application.app: Creating...
azuread_application.app: Creation complete after 3s [id=37a44efb-1cd2-44e4-a149-d9bb9c315d6f]
azuread_application_password.service_principal_password: Creating...
azuread_service_principal.service_principal: Creating...
Apply complete! Resources: 11 added, 0 changed, 0 destroyed.
Outputs:
...
You can go to Azure portal in your web browser to check the resources you created.
Running the command below to export environment values:
source ./terraform/setup_env.shterraform\setup_env.ps1If you want to run the sample in debug mode, you can save the output value.
KEY_VAULT_SSL_BUNDLES_CLIENT_ID=
KEY_VAULT_SSL_BUNDLES_CLIENT_SECRET=
KEY_VAULT_SSL_BUNDLES_KEYVAULT_URI_01=
KEY_VAULT_SSL_BUNDLES_KEYVAULT_URI_02=
KEY_VAULT_SSL_BUNDLES_RESOURCE_GROUP_NAME=
KEY_VAULT_SSL_BUNDLES_TENANT_ID=In your terminal, run mvn clean spring-boot:run.
mvn clean spring-boot:runYou can debug your sample by adding the saved output values to the tool's environment variables or the sample's application.yaml file.
-
If your tool is
IDEA, please refer to Debug your first Java application and add environment variables. -
If your tool is
ECLIPSE, please refer to Debugging the Eclipse IDE for Java Developers and Eclipse Environment Variable Setup.
-
Send below inbound HTTPS request:
curl --insecure https://localhost:8443/ssl-test
You will see the following in the console:
Inbound TLS is working! -
Send below outbound HTTPS request:
curl --insecure https://localhost:8443/ssl-test-outbound
you will see console like this:
Outbound TLS is working!
After running the sample, if you don't want to run the sample, remember to destroy the Azure resources you created to avoid unnecessary billing.
The terraform destroy command terminates resources managed by your Terraform project.
To destroy the resources you created.
terraform -chdir=./terraform destroy -auto-approveterraform -chdir=terraform destroy -auto-approve