An open API service indexing awesome lists of open source software.

https://github.com/cricketthomas/azurekeyvaultexplorer

Azure Key Vault Explorer — a cross platform GUI desktop application for aggregating secrets (and keys and certificates) in Azure Key Vault
https://github.com/cricketthomas/azurekeyvaultexplorer

avalonia avaloniaui azure azure-key-vault azurekeyvault cross-platform dotnet fluentdesign gui keyvault linux macos ubuntu uno uno-platform windows winui xaml

Last synced: 19 days ago
JSON representation

Azure Key Vault Explorer — a cross platform GUI desktop application for aggregating secrets (and keys and certificates) in Azure Key Vault

Awesome Lists containing this project

README

          





Azure Key Vault Explorer



Find Key Vaults in Azure faster.






### Install via Winget (Windows)
```pwsh
winget install "Key Vault Explorer" --source msstore
```

### macOS and Linux
Download from the [releases page](https://github.com/cricketthomas/AzureKeyVaultExplorer/releases).


Named 'Key Vault Explorer' in the Microsoft Store.


## Overview
Visit the releases section to download the application for mac and linux.

**Key Vault Explorer** is a lightweight tool with the idea to simplify finding and accessing secrets (and certificates and keys) stored in Azure Key Vault, providing a interface for aggregating, filtering, and quickly getting secret values. The app was inspired by the original [AzureKeyVaultExplorer](https://github.com/microsoft/AzureKeyVaultExplorer) with the goal to eventually bring some more feature parity but first brining the application to macOS.

### Key features

- Signing in with a Microsoft Account [See how credentials are secured](#security)
- Support to selectively include/exclude subscriptions to show resource groups and key vaults in the tree
- Ability to filter subscriptions, resource groups, and key vaults by name
- Saving vaults to "pinned" section in quick access menu and saving selected subscriptions in SQLite
- Copy secrets to the clipboard using Control+C
- Automatic clearing of clipboard values after a set amount of time (configurable up to 60 seconds)
- Viewing details and tags about values
- Filtering and sorting of values
- Viewing last updates and next to expire values
- Downloading and saving .pfx and .cer files
- Support for custom ClientId and TenantId
- AzureGovernment, AzureChina and AzureGermany Support

### Privacy Features
- **No telemetry or logs collected**
- SQLite Database encryption using DPAPI and KeyChain on Mac

# Security

The authentication and credentials storage uses [Microsoft.Identity.Client.Extensions.Msal](https://github.com/AzureAD/microsoft-authentication-library-for-dotnet) library are encrypted and stored with DPAPI on windows, and the keychain on macOS (you may be prompted multiple times to grant rights).
The security is pulled directly from this document: https://github.com/AzureAD/microsoft-authentication-extensions-for-dotnet/wiki/Cross-platform-Token-Cache#configuring-the-token-cache

The SQLite database is encrypted using DPAPI on windows, and on macOS the password in the keychain.

## Screenshots

image

Screenshot 2026-03-18 at 7 21 15 PM

## Download

### Get it from the [releases](https://github.com/cricketthomas/AzureKeyVaultExplorer/releases) page or the Microsoft Store.

#### macOS
After downloading the `.app` bundle, macOS may block it because it's from an unidentified developer. To fix this, run:

```bash
xattr -cr "/path/to/Key Vault Explorer.app"
```

Then move the app to your **Applications** folder. You may also need to go to **System Settings > Privacy & Security** and click **"Open Anyway"**.

#### Windows
After downloading the `.exe`, Windows may block it (unless you got it from winget or Microsoft Store). Right-click the file, select **Properties**, and check the **"Unblock"** checkbox at the bottom, then click **OK**.

## Setting up the application:
> [!WARNING]
> After downloading for the first time you will need to follow the first time setup guide listed below:

## Azure CLI
> [!NOTE]
> You can use a custom client ID that belongs to Microsoft Azure CLI. This is intended for testing only and is not recommended by the maintainers of this repository, as it may violate Microsoft’s Terms of Service.
> Doing so can bypass the need for an IT administrator to grant permissions to the application, effectively circumventing the standard consent process. Once done, click save in the settings page and restart the application.
> See this article for more details on the well-known client ID. https://rakhesh.com/azure/well-known-client-ids/
image

## Documentation
- [Building from source](docs/BUILDING.md)
- [Using your own Client ID / Tenant ID](docs/CUSTOM-CLIENT-TENANT-ID.md)
- [First time Azure Tenant setup](docs/FIRST-TIME-SETUP.md)
- [Troubleshooting](docs/TROUBLESHOOTING.md)

## Acknowledgements

Installer built with: [Master Packager Dev](https://www.masterpackager.com/masterpackagerdev/)

### Dependencies
- **[.NET 10](https://github.com/dotnet/runtime)**
- **[Avalonia](https://github.com/AvaloniaUI/Avalonia/)**
- **[Uno Platform](https://github.com/unoplatform/uno)**
- **[FluentAvalonia](https://github.com/amwx/FluentAvalonia/)**