8.3.1.6 Step 5: Use a Connect Identifier Containing Azure App Configuration Store Values
Use the Azure App Configuration name, key path, and Azure authentication parameters in a database client connection identifier.
config-azure://{appconfig-name}[?key=prefix&label=value&option1=value1&option2=value2...]
The syntax details are:
Syntax Element | Description |
---|---|
|
Name of your Azure App Configuration store. |
|
Prefix of your key, without the |
|
Label to be used for the connect descriptor. Labels are used to differentiate key-values with the same key. Refer to Microsoft Azure documentation for additional details. |
|
Both the authentication method and corresponding authentication parameters to access your Centralized Configuration Provider. Authentication method: Use the
Authentication parameters: Set authentication parameters corresponding to your chosen authentication method, as described in AUTHENTICATION. For example, if using the default OAuth 2.0 Client Credentials authentication method, then set authentication parameters such as For detailed information on all authentication parameters, see Authentication Parameters for Azure App Configuration Store. |
Examples:
Let us look at some examples on how to specify a connect identifier string with different values:
-
With the default OAuth 2.0 Client Credentials authentication:
For multiple applications, such as
sales
andhr
, you can store a connect descriptor forsales
under thedatabase/sales
prefix and forhr
under thedatabase/hr
prefix.The following usage of naming looks up aconnect_descriptor
under thedatabase/sales
prefix. Here, theAUTHENTICATION=AZURE_DEFAULT
setting is omitted. Authentication method for the default flow is implicit, so only the client credentials are specified using theAZURE_CLIENT_ID
,AZURE_CLIENT_SECRET
, andAZURE_TENANT_ID
authentication parameters.-
With database credentials specified in the string:
sqlplus dbuser@"config-azure://dbclient-appconfig?key=database/sales/&azure_client_id=a1abc12-ab12-1ab1-a1b1-123a&azure_client_secret=A123B~AB123a~AB1234_abab&azure_tenant_id=123ab-12a12-1a2b1-a1b2"
-
With database credentials stored in Azure Key Vault:
sqlplus /@"config-azure://dbclient-appconfig?key=database/sales/&azure_client_id=a1abc12-ab12-1ab1-a1b1-123a&azure_client_secret=A123B~AB123a~AB1234_abab&azure_tenant_id=123ab-12a12-1a2b1-a1b2"
Similarly, the following usage of naming looks up aconnect_descriptor
under thedatabase/hr
prefix:-
With database credentials specified in the string:
sqlplus dbuser@"config-azure://dbclient-appconfig?key=database/hr/&azure_client_id=a1abc12-ab12-1ab1-a1b1-123a&azure_client_secret=A123B~AB123a~AB1234_abab&azure_tenant_id=123ab-12a12-1a2b1-a1b2"
-
With database credentials stored in Azure Key Vault:
sqlplus /@"config-azure://dbclient-appconfig?key=database/hr/&azure_client_id=a1abc12-ab12-1ab1-a1b1-123a&azure_client_secret=A123B~AB123a~AB1234_abab&azure_tenant_id=123ab-12a12-1a2b1-a1b2"
-
-
With the Azure Service Principal authentication:
-
With database credentials specified in the string:
sqlplus dbuser@"config-azure://dbclient-appconfig?key=database/sales/&authentication=azure_service_principal&azure_client_id=a1abc12-ab12-1ab1-a1b1-123a&azure_client_secret=A123B~AB123a~AB1234_abab&azure_client_certificate_path=/app/dbclient/certificate_for_authenticaion.txt&azure_tenant_id=123ab-12a12-1a2b1-a1b2"
-
With database credentials stored in Azure Key Vault:
sqlplus /@"config-azure://dbclient-appconfig?key=database/sales/&authentication=azure_service_principal&azure_client_id=a1abc12-ab12-1ab1-a1b1-123a&azure_client_secret=A123B~AB123a~AB1234_abab&azure_client_certificate_path=/app/dbclient/certificate_for_authenticaion.txt&azure_tenant_id=123ab-12a12-1a2b1-a1b2"
-
-
With the Azure Managed Identity authentication:
-
With database credentials specified in the string:
sqlplus dbuser@"config-azure://dbclient-appconfig?key=database/sales/&authentication=azure_managed_identity"
-
With database credentials stored in Azure Key Vault:
sqlplus /@"config-azure://dbclient-appconfig?key=database/sales/&authentication=azure_managed_identity"
-