Security Token is not a Secret. Password, Private Keys, Certificates, etc., are secrets. Tokens are generated when request is made and they change with almost each request and valid for short duration only. So, there is no point in protecting the token by storing it in the vault to use it when needed, it is not a static value.
But in the context of the answer, I believe AD is more appropriate as per https://docs.microsoft.com/en-us/azure/active-directory/develop/authentication-scenarios#security-tokens
An application should connect to an authorization server to retrieve security tokens. This server is responsible for authenticating users and issuing tokens, such as access tokens, refresh tokens, and ID tokens.
For example, in the context of the Microsoft identity platform, applications connect to Azure Active Directory (Azure AD) to obtain these tokens. The tokens are then used to access protected resources, such as web APIs
-> Azure Key Vault is used to store secrets for server applications
-> You need to connect to Azure Active Directory to retrieve these security tokens
Steps:
1) Application Authenticate with Azure AD
2) Application receives token from Azure AD
Azure Key Vault is a service used to securely store and manage secrets, keys, and certificates, but it is not used for retrieving security tokens for application authentication or authorization. Instead, Azure Active Directory (Azure AD) is the service used for obtaining and managing security tokens.
The correct answer is B.
An application should connect to Azure Active Directory (Azure AD) to retrieve security tokens. Azure AD is the identity provider that issues security tokens for authentication and authorization purposes12.
Azure Key Vault, on the other hand, is used to securely store secrets, such as API keys, passwords, and certificates, but it is not used to issue security tokens2.
the cuestion is right , it says applications security tokens not users , and of course application connect to key vault to can replace values of appSettings properties
Its D
Storing Application Secrets:
API Keys and Tokens: Securely store API keys, tokens, and other sensitive configuration data that applications need to access.
Database Connection Strings: Store connection strings securely and retrieve them as needed for application configuration.
When an application needs to authenticate itself or a user to access another service, it typically requests a security token from Azure AD, which validates the credentials and returns a token that the application can use to access the desired service.
Answer D
In the context of Azure and authentication, an application typically connects to Azure Active Directory (Azure AD) to retrieve security tokens. Azure AD is Microsoft's cloud-based identity and access management service that helps your users sign in and access resources
This section is not available anymore. Please use the main Exam Page.AZ-900 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
vanr2000
Highly Voted 5 years, 8 months agoJustSignalingVirtues
2 years, 11 months agoNathan12345
8 months agoexam_taker5
5 years, 8 months agoSisb
3 years, 3 months agoRTT1976
Highly Voted 5 years, 6 months agoChristian_garcia_martin
9 months, 3 weeks agorichardsonbq
5 years, 5 months agorichardsonbq
5 years, 5 months agoclouddba
3 years, 10 months agovsivas
5 years, 4 months agoclouddba
3 years, 10 months agoArkar
Most Recent 3 months, 3 weeks agoTridi
4 months agoArkar
4 months, 1 week agoMechaSuprim
4 months, 3 weeks ago686f30c
5 months, 3 weeks agoSuper63
6 months ago126e81f
8 months, 1 week agoGenichiro
8 months, 2 weeks agoChristian_garcia_martin
9 months, 3 weeks agoNicosi
9 months, 3 weeks agosiculoct
10 months, 3 weeks agolinux_admin
1 year, 1 month ago4pelos
1 year, 3 months ago4pelos
1 year, 3 months agoaz900k
1 year, 3 months agoDogDaddy
1 year, 6 months ago