I'm working to remove secrets, like connection strings, passwords, etc. from our source code saved in Git repositories. One solution that looks very promising it storing secrets in Azure Key Vault. So, that's what I've been investigating.
We need to do this for on-prem, behind our security system, Intranet apps, which aren't exposed on the Internet. To test this, I've created an Azure Key Vault and put some secrets into it. Then I've written a simple .NET 8 console app, to try and find the secrets. I had been following this Microsoft Learn tutorial. I can get everything, but the ClientSecret. So, I've been trying to find that, which led me to this post on Stack Overflow.
Now I'm confused, because it looks to me like the app must be accessible from the Internet in some way, so that I can register it in Azure. However, if it is an Intranet app or a Windows app running behind our firewall, I don't see how that can happen.
Am I misunderstanding this? If it is possible to read secrets from an Azure Key Vault by an Intranet web app or a Windows app that only runs within our network, how is that done?