I'm trying to follow the suggestions shown in Best practices for deploying passwords and other sensitive data to ASP.NET and Azure App Service. The primary tenet of the document is that when on Azure, secrets shouldn't be stored in application configuration files; they should be stored in the Application Settings blade of the App Service.
I've got multiple webjobs associated with a given Azure App Service (website). The webjobs all talk to the same external api but they each have their own individual secrets associated with it, e.g. api tokens. To simplify configuration, each of the webjobs' app.config
files in the development environment have the same app setting key, e.g.
<add key="AWSApiToken" value="token_for_webjob1" /> <!--webjob1-->
<add key="AWSApiToken" value="token_for_webjob2" /> <!--webjob2-->
<add key="AWSApiToken" value="token_for_webjob3" /> <!--webjob3-->
The problem here is that while the webjobs each have individual app.config
files in development, they share the Applications Settings blade associated with their common website in Azure.
So if the best practice is to store app secrets in Azure, what would I do for the case of multiple webjobs associated with the same site if I wanted to keep using common key names for the app settings?