Configuring Credentials in Azure Key Vault

After the configuration playbook successfully finished, your Azure Key Vault instance will contain the following secrets for each server you configured in watchlists:

  • Credentials secrets (username and password)
  • App client ID secret (only for the Coveware server)
  • Access token
  • Refresh token

To configure credentials in your Azure Key Vault instance, perform the following steps:

  1. In the Microsoft Azure portal menu, click All services and select Security > Key vaults.
  2. On the Key vaults service page, select the Azure Key Vault instance you specified during the Veeam Data Connector deployment.
  3. Click Objects > Secrets.
  4. For each Veeam Backup & Replication server you configured in the Veeam Backup & Replication Settings watchlist, do the following:
  • Configure the secret you created for the user account you use to connect to the Veeam Backup & Replication REST API:
  1. Click the name of the secret.
  2. Click New version.
  3. In the Secret value field, specify the user account in the DOMAIN/USER format. Note that this account must have administrator privileges and multi-factor authentication (MFA) disabled. For more information, see Disabling MFA for Service Accounts in the Veeam Backup & Replication User Guide.
  4. Click Create.

Configuring Credentials in Azure Key Vault 

  • Configure the secret you created for the user account password:
  1. Click the name of the secret.
  2. Click New version.
  3. In the Secret value field, specify the user account password.
  4. Click Create.

Configuring Credentials in Azure Key Vault 

  1. For each Veeam ONE server you configured in the VONE Settings watchlist, do the following:
  • Configure the secret you created for the user account you use to connect to the Veeam ONE REST API:
  1. Click the name of the secret.
  2. Click New version.
  3. In the Secret value field, specify the user account in the DOMAIN/USER format. Note that this account must have administrator privileges and multi-factor authentication (MFA) disabled.
  4. Click Create.

Configuring Credentials in Azure Key Vault 

  • Configure the secret you created for the user account password:
  1. Click the name of the secret.
  2. Click New version.
  3. In the Secret value field, specify the user account password.
  4. Click Create.

Configuring Credentials in Azure Key Vault 

  1. For each server you configured in the Coveware Settings watchlist, do the following:
  • Configure the secret you created for the user account you use to connect to the Recon Scanner REST API:
  1. Click the name of the secret.
  2. Click New version.
  3. In the Secret value field, specify the user name you get in the Coveware portal. For more information, see API Integrations in the Recon Scanner User Guide.
  4. Click Create.

Configuring Credentials in Azure Key Vault 

  • Configure the secret you created for the user account password:
  1. Click the name of the secret.
  2. Click New version.
  3. In the Secret value field, specify the user account password you get in the Coveware portal. For more information, see API Integrations in the Recon Scanner User Guide.
  4. Click Create.

Configuring Credentials in Azure Key Vault 

  • Configure the secret you created for the client ID:
  1. Click the name of the secret.
  2. Click New version.
  3. In the Secret value field, specify the client ID you get in the Coveware portal. For more information, see API Integrations in the Recon Scanner User Guide.
  4. Click Create.

Configuring Credentials in Azure Key Vault