Protecting Your Passwords with the .NET Secret Manager

March 09, 2018
Written by

Protect-Your-Passwords

As developers, we’ve all done this at least once. We’ve spent time building a cool project that uses a third party API, and then checked it into Github only to realize our API password is there in plain text for all to see. Do a search in Github to see how frequently this still happens.

When I’m writing code for the first time I hard code those values in my code to get things working and then go to commit it to source control. That’s about the time I remember saving passwords into source control is one of the seven Deadly Sins of Security.

If you’re coding in .NET, the Secret Manager makes it easy to remove these sensitive details before checking your code in. It saves those passwords in your environment variables on your machine.

Let’s say you find yourself building an app that searches for music on Spotify. To search Spotify’s API, you’ll need a client ID and secret. We will replace the hardcoded passwords in our project with the Secret Manager to keep those sensitive details out of source control. When you’re done with this tutorial, you’ll have a functional SMS jukebox that uses the Spotify API.

Ingredients for This Recipe

We’ve got a few tools to install in order to complete this challenge (skip 1-4 if you already have Visual Studio Core setup):

  1. Git
  2. .NET Core
  3. Visual Studio Core & C# Extension
  4. Ngrok
  5. Spotify Application & Credentials

Add Secret Manager to an ASP.NET Core Web API Project

Let’s grab a copy of an existing project from my Git repo. This project is an SMS Jukebox that uses the body of incoming SMS to lookup music data. To get started, use this to clone the project locally: git clone "https://github.com/clw895/SpotifySMS.git" SecretProjectI’ve cloned it to ~/Code/SecretProject but it is totally cool to save it in a different path! Next open the folder in Visual Studio Code and try out the steps below:

  1. Update the SpotifySMS.csproj file to add the highlighted XML right above the Project closing tag:


<Project Sdk="Microsoft.NET.Sdk.Web">
   ...
  <ItemGroup>
    <DotNetCliToolReference Include="Microsoft.VisualStudio.Web.CodeGeneration.Tools" Version="2.0.2" />
    <DotNetCliToolReference Include="Microsoft.Extensions.SecretManager.Tools" Version="2.0.0" />
  </ItemGroup>
</Project>

  1. Open an integrated terminal and run dotnet restore in the terminal. This adds the Secret Manager to our project
  2. Get a GUID which will be used to save our secrets locally on our machine and copy that to your clipboard
  3. In the csproj file, add the GUID to the PropertyGroup at the top of the csproj file like the below:


<Project Sdk="Microsoft.NET.Sdk.Web">
  <PropertyGroup>
    <TargetFramework>netcoreapp2.0</TargetFramework>
    <UserSecretsId>UPDATE_WITH_GUID_HERE</UserSecretsId>
  </PropertyGroup>
  ...
</Project>

We’ve just added Secret Manager to your project and created a secret store on your machine. Now let’s protect some passwords!

Using Secrets in the Secret Manager Tool

Time to add the Spotify client ID and secret to our secret store. To get an ID and secret, create a Spotify app and both values will be provided to you. Back in Visual Studio Code, open an integrated terminal and run:

dotnet user-secrets set CLIENT_ID “UPDATE_WITH_YOUR_CLIENT_ID”
dotnet user-secrets set CLIENT_SECRET “UPDATE_WITH_YOUR_CLIENT_SECRET”

Those commands add our Spotify app details to the secret store. Next we are going to edit the SpotifyController.cs file to read the secrets out of the configuration store. In the SpotifyController.cs, start by:

  1. Add the below properties under the class declaration. We’re going to use these properties throughout our code to access the information in our secret store:

public IConfiguration Configuration { get; set; }
public string SPOTIFY_ID {get; private set;}
public string SPOTIFY_SECRET {get; private set;}
  • Replace the class constructor with the code to read the values from our secret store. ASP.NET Core will inject the values from our secret store into the IConfiguration confg variable in the class constructor.:
public SpotifyController(IConfiguration config)
{
    Configuration = config;
    SPOTIFY_ID = Configuration[“CLIENT_ID”];
    SPOTIFY_SECRET = Configuration[“CLIENT_SECRET”];
}

Testing Our Secret Manager Project

Start up our SMS jukebox by typing dotnet run in the Integrated Terminal. Then in a separate terminal or command prompt window, start ngrok: ngrok http 5000You can test it by firing up your browser and sending an HTTP GET request to http://{YOUR_NGROK_URL}/api/spotify?body={YOUR_SONG_HERE}. To get it working with SMS, login to Twilio (or create an account if you don’t have one), purchase a telephone number, and configure the inbound text message to send an HTTP GET request to your ngrok url as in the screenshot below:

Then fire off a text message with a song name to your Twilio number and watch the magic happen!

Consider Yourself Password Protected

And just lik

e that we are password protected. Grab a copy of the completed code from Github and update it with your Spotify credentials to see a complete sample in action. If you have questions or run into trouble, give a shout below, on Twitter at @coreylweathers, or through email at corey@twilio.com. I can’t wait to see what you build.