AzureKeyVaultExplorer
Azure Key Vault Explorer — a cross platform GUI desktop application for aggregating secrets (and keys and certificates) in Azure Key Vault
Install / Use
/learn @cricketthomas/AzureKeyVaultExplorerREADME
Install via Winget (Windows)
winget install "Key Vault Explorer" --source msstore
macOS and Linux
Download from the releases page.
<p style="display: block" align="center"> <sup>Named 'Key Vault Explorer' in the Microsoft Store.</sub> </p>Overview
Visit the releases section to download the application for mac and linux.
Key Vault Explorer is a lightweight tool with the idea to simplify finding and accessing secrets (and certificates and keys) stored in Azure Key Vault, providing a interface for aggregating, filtering, and quickly getting secret values. The app was inspired by the original AzureKeyVaultExplorer with the goal to eventually bring some more feature parity but first brining the application to macOS.
Key features
- Signing in with a Microsoft Account See how credentials are secured
- Support to selectively include/exclude subscriptions to show resource groups and key vaults in the tree
- Ability to filter subscriptions, resource groups, and key vaults by name
- Saving vaults to "pinned" section in quick access menu and saving selected subscriptions in SQLite
- Copy secrets to the clipboard using Control+C
- Automatic clearing of clipboard values after a set amount of time (configurable up to 60 seconds)
- Viewing details and tags about values
- Filtering and sorting of values
- Viewing last updates and next to expire values
- Downloading and saving .pfx and .cer files
- Support for custom ClientId and TenantId
- AzureGovernment, AzureChina and AzureGermany Support
Privacy Features
- No telemetry or logs collected
- SQLite Database encryption using DPAPI and KeyChain on Mac
Security
The authentication and credentials storage uses Microsoft.Identity.Client.Extensions.Msal library are encrypted and stored with DPAPI on windows, and the keychain on macOS (you may be prompted multiple times to grant rights). The security is pulled directly from this document: https://github.com/AzureAD/microsoft-authentication-extensions-for-dotnet/wiki/Cross-platform-Token-Cache#configuring-the-token-cache
The SQLite database is encrypted using DPAPI on windows, and on macOS the password in the keychain.
Screenshots
<img width="1322" height="868" alt="image" src="https://github.com/user-attachments/assets/ad5d6b46-17ff-4e5b-b8b3-fc949681192f" /> <img width="1527" height="1088" alt="Screenshot 2026-03-18 at 7 21 15 PM" src="https://github.com/user-attachments/assets/5a0024e3-7122-434a-938b-cc5a1cfa5542" />Download
Get it from the releases page or the Microsoft Store.
macOS
After downloading the .app bundle, macOS may block it because it's from an unidentified developer. To fix this, run:
xattr -cr "/path/to/Key Vault Explorer.app"
Then move the app to your Applications folder. You may also need to go to System Settings > Privacy & Security and click "Open Anyway".
Windows
After downloading the .exe, Windows may block it (unless you got it from winget or Microsoft Store). Right-click the file, select Properties, and check the "Unblock" checkbox at the bottom, then click OK.
Setting up the application:
[!WARNING] After downloading for the first time you will need to follow the first time setup guide listed below:
Azure CLI
[!NOTE] You can use a custom client ID that belongs to Microsoft Azure CLI. This is intended for testing only and is not recommended by the maintainers of this repository, as it may violate Microsoft’s Terms of Service. Doing so can bypass the need for an IT administrator to grant permissions to the application, effectively circumventing the standard consent process. Once done, click save in the settings page and restart the application. See this article for more details on the well-known client ID. https://rakhesh.com/azure/well-known-client-ids/
<img width="800" alt="image" src="https://github.com/user-attachments/assets/fe6a970c-b0bc-455c-9775-5aa57b865fd1" />
Documentation
- Building from source
- Using your own Client ID / Tenant ID
- First time Azure Tenant setup
- Troubleshooting
Acknowledgements
<img src="https://www.masterpackager.com/media/site/img/icon_blue.svg" width="100"/>Installer built with: Master Packager Dev
Dependencies
Related Skills
tmux
347.9kRemote-control tmux sessions for interactive CLIs by sending keystrokes and scraping pane output.
claude-opus-4-5-migration
108.7kMigrate prompts and code from Claude Sonnet 4.0, Sonnet 4.5, or Opus 4.1 to Opus 4.5
diffs
347.9kUse the diffs tool to produce real, shareable diffs (viewer URL, file artifact, or both) instead of manual edit summaries.
blogwatcher
347.9kMonitor blogs and RSS/Atom feeds for updates using the blogwatcher CLI.
