MR
Mayur Rathi
@mayurrathi
⭐ 5 GitHub stars

Azure Security Keyvault Secrets Java

Azure Key Vault Secrets Java SDK for secret management. Use when storing, retrieving, or managing passwords, API keys, connection strings, or other sensitive configuration data.

mkdir -p ./skills/azure-security-keyvault-secrets-java && curl -sfL https://raw.githubusercontent.com/mayurrathi/awesome-agent-skills/main/skills/azure-security-keyvault-secrets-java/SKILL.md -o ./skills/azure-security-keyvault-secrets-java/SKILL.md

Run in terminal / PowerShell. Requires curl (Unix) or PowerShell 5+ (Windows).

Skill Content

# Azure Key Vault Secrets (Java)


Securely store and manage secrets like passwords, API keys, and connection strings.


Installation


```xml

<dependency>

<groupId>com.azure</groupId>

<artifactId>azure-security-keyvault-secrets</artifactId>

<version>4.9.0</version>

</dependency>

```


Client Creation


```java

import com.azure.security.keyvault.secrets.SecretClient;

import com.azure.security.keyvault.secrets.SecretClientBuilder;

import com.azure.identity.DefaultAzureCredentialBuilder;


// Sync client

SecretClient secretClient = new SecretClientBuilder()

.vaultUrl("https://<vault-name>.vault.azure.net")

.credential(new DefaultAzureCredentialBuilder().build())

.buildClient();


// Async client

SecretAsyncClient secretAsyncClient = new SecretClientBuilder()

.vaultUrl("https://<vault-name>.vault.azure.net")

.credential(new DefaultAzureCredentialBuilder().build())

.buildAsyncClient();

```


Create/Set Secret


```java

import com.azure.security.keyvault.secrets.models.KeyVaultSecret;


// Simple secret

KeyVaultSecret secret = secretClient.setSecret("database-password", "P@ssw0rd123!");

System.out.println("Secret name: " + secret.getName());

System.out.println("Secret ID: " + secret.getId());


// Secret with options

KeyVaultSecret secretWithOptions = secretClient.setSecret(

new KeyVaultSecret("api-key", "sk_live_abc123xyz")

.setProperties(new SecretProperties()

.setContentType("application/json")

.setExpiresOn(OffsetDateTime.now().plusYears(1))

.setNotBefore(OffsetDateTime.now())

.setEnabled(true)

.setTags(Map.of(

"environment", "production",

"service", "payment-api"

))

)

);

```


Get Secret


```java

// Get latest version

KeyVaultSecret secret = secretClient.getSecret("database-password");

String value = secret.getValue();

System.out.println("Secret value: " + value);


// Get specific version

KeyVaultSecret specificVersion = secretClient.getSecret("database-password", "<version-id>");


// Get only properties (no value)

SecretProperties props = secretClient.getSecret("database-password").getProperties();

System.out.println("Enabled: " + props.isEnabled());

System.out.println("Created: " + props.getCreatedOn());

```


Update Secret Properties


```java

// Get secret

KeyVaultSecret secret = secretClient.getSecret("api-key");


// Update properties (cannot update value - create new version instead)

secret.getProperties()

.setEnabled(false)

.setExpiresOn(OffsetDateTime.now().plusMonths(6))

.setTags(Map.of("status", "rotating"));


SecretProperties updated = secretClient.updateSecretProperties(secret.getProperties());

System.out.println("Updated: " + updated.getUpdatedOn());

```


List Secrets


```java

import com.azure.core.util.paging.PagedIterable;

import com.azure.security.keyvault.secrets.models.SecretProperties;


// List all secrets (properties only, no values)

for (SecretProperties secretProps : secretClient.listPropertiesOfSecrets()) {

System.out.println("Secret: " + secretProps.getName());

System.out.println(" Enabled: " + secretProps.isEnabled());

System.out.println(" Created: " + secretProps.getCreatedOn());

System.out.println(" Content-Type: " + secretProps.getContentType());


// Get value if needed

if (secretProps.isEnabled()) {

KeyVaultSecret fullSecret = secretClient.getSecret(secretProps.getName());

System.out.println(" Value: " + fullSecret.getValue().substring(0, 5) + "...");

}

}


// List versions of a secret

for (SecretProperties version : secretClient.listPropertiesOfSecretVersions("database-password")) {

System.out.println("Version: " + version.getVersion());

System.out.println("Created: " + version.getCreatedOn());

System.out.println("Enabled: " + version.isEnabled());

}

```


Delete Secret


```java

import com.azure.core.util.polling.SyncPoller;

import com.azure.security.keyvault.s

🎯 Best For

  • Security auditors
  • DevSecOps teams
  • Compliance officers
  • Claude users
  • Software engineers

💡 Use Cases

  • Auditing dependencies for known CVEs
  • Scanning API endpoints for auth gaps
  • Code quality improvement
  • Best practice enforcement

📖 How to Use This Skill

  1. 1

    Install the Skill

    Copy the install command from the Terminal tab and run it. The SKILL.md file downloads to your local skills directory.

  2. 2

    Load into Your AI Assistant

    Open Claude and reference the skill. Paste the SKILL.md content or use the system prompt tab.

  3. 3

    Apply Azure Security Keyvault Secrets Java to Your Work

    Open your project in the AI assistant and ask it to apply the skill. Start with a small module to verify the output quality.

  4. 4

    Review and Refine

    Review AI suggestions before committing. Run tests, check for regressions, and iterate on the skill output.

❓ Frequently Asked Questions

Can this replace a dedicated SAST tool?

AI-based security review is complementary to SAST tools. Use it as a first-pass filter, not a replacement.

Is Azure Security Keyvault Secrets Java compatible with Cursor and VS Code?

Yes — this skill works with any AI coding assistant including Cursor, VS Code with Copilot, and JetBrains IDEs.

Do I need specific dependencies for Azure Security Keyvault Secrets Java?

Check the install command and Works With section. Most code skills only require the AI assistant and your codebase.

How do I install Azure Security Keyvault Secrets Java?

Copy the install command from the Terminal tab and run it. The skill downloads to ./skills/azure-security-keyvault-secrets-java/SKILL.md, ready to use.

Can I customize this skill for my team?

Absolutely. Edit the SKILL.md file to add team-specific instructions, examples, or workflows.

⚠️ Common Mistakes to Avoid

Only scanning surface-level issues

Deep security review requires understanding your app architecture, not just regex patterns.

Skipping validation

Always test AI-generated code changes, even for simple refactors.

Missing dependency updates

Check if the skill requires updated dependencies or new packages.

🔗 Related Skills