You know the feeling. You’re midway through an infrastructure rollout, secrets scattered, approvals pending, and half your service accounts are wondering which cloud they're even in. The fix should be obvious: store secrets once, provision everywhere, and let policy handle the rest. So why does connecting Azure Key Vault to Google Cloud Deployment Manager still feel like herding YAML?
At its core, Azure Key Vault is a fortress for secrets, certificates, and keys. It centralizes encryption and rotates credentials without manual effort. Google Cloud Deployment Manager, on the other hand, is all about repeatable configuration and predictable environment setup. One defines what infrastructure looks like, the other protects the sensitive data it needs. Together, they form a clean security loop, if you wire them correctly.
Integrating them starts with identity. Map your Azure Key Vault-managed service identities to Google Service Accounts using federated credentials. This lets Deployment Manager reference keys or secrets without exposing them in templates. The vault stays in Azure, but thanks to OIDC and cross-cloud roles, Deployment Manager can fetch what it needs at runtime, encrypted in transit and logged for compliance. No plain text, no shared tokens, no human copy-paste rituals.
Once identities are trusted, automation takes over. When Deployment Manager spins up resources, it requests runtime values—API keys, TLS certificates, or database passwords—directly from Key Vault via a small authentication proxy or custom provider. The pipeline never stores these secrets. The config stays versioned and clean, while the values stay protected and independently rotated.
Quick answer:
You connect Azure Key Vault and Google Cloud Deployment Manager through identity federation. Azure issues short-lived tokens trusted by Google to access vault secrets at deploy time, removing the need for static secrets or shared credentials.