DEV Community

Cover image for Protecting and Hiding your Bing Maps Key
Clemens Schotte
Clemens Schotte

Posted on • Originally published at

Protecting and Hiding your Bing Maps Key


When using Bing Maps for Enterprise in your solution/application, you need a Basic Key (limited free trial) or an Enterprise key to use the services. For example, you would add a Bing Maps Key to the script URL loading the Bing Maps Web Control like this:

<script src="{your bing maps key}"></script>
Enter fullscreen mode Exit fullscreen mode

Now your key is open text on your site source code and people who look can find and use your key. Search engines will index your page and, as a result, will also store your key. Is this a problem? Not really.


The Bing Maps key is mainly used to determine the usage and allow access to Bing Maps features. To protect your Bing Maps key, so it can't be misused on other websites, there is an option in the Bing Maps Dev Center to protect your key. This security option allows you to specify a list of referrers (website URLs) and IP numbers who can use your key. When at least one referrer rule is active, any requests that omit a referrer and any requests from non-approved referrers will be blocked, preventing others from using your key for requests. You can have up to 300 referrer and IP security rules per key.

Bing Maps Key Security Settings

Your key is now protected but is still visible in your website code. So how do I hide my Bing Maps key?

A best practice is never to store any keys or certificates in source code.


To hide the Bing Maps key, you create a simple API endpoint that will only return the Bing Maps key if the request comes from a trusted referral URL. The Bing Maps Samples site is a good example that uses this approach.

In this example we are using an Anonymous HttpTrigger Azure Function written in C# that returns the Bing Maps key:

public static class GetBingMapsKey
    private static readonly string[] allowd = { "",

    public static IActionResult Run([HttpTrigger(AuthorizationLevel.Anonymous, "get", Route = null)] HttpRequest req)
        string referer = req.Headers["Referer"];
        if (string.IsNullOrEmpty(referer))
            return new UnauthorizedResult();

        string result = Array.Find(allowd, site => referer.StartsWith(site, StringComparison.OrdinalIgnoreCase));
        if (string.IsNullOrEmpty(result))
            return new UnauthorizedResult();

        // Get your Bing Maps key from
        string key = Environment.GetEnvironmentVariable("BING_MAPS_SUBSCRIPTION_KEY");

        return new OkObjectResult(key);
Enter fullscreen mode Exit fullscreen mode

The Bing Maps key is stored server-side in this Azure Function Application settings field. We are using the GetEnvironmentVariable() to get the key.

Azure Function Application settings

Next, we need to load the Bing Maps script and get the key from the API client-side. Finally, we use the following code snippet to load Bing Maps dynamically:

    // Dynamic load the Bing Maps Key and Script
    // Get your own Bing Maps key at
    (async () => {
        let script = document.createElement("script");
        let bingKey = await fetch("").then(r => r.text()).then(key => { return key });
        script.setAttribute("src", `${bingKey}`);
Enter fullscreen mode Exit fullscreen mode

The browser will run this code and create at runtime in the DOM the same line of <script> tag we have seen at the beginning of this blog post to load Bing Maps and the Key. An additional advantage is that the Bing Maps key is not stored in the source code anymore and that you can use IaC and build pipelines to deploy the solution.

Note: Only hiding the Bing Maps key alone is not enough as a security measure. We recommend you still enable the security option in the Bing Maps Dev Center!

Top comments (1)

ogedi001 profile image

You can hide the API key from the client side using embeded javascript like ejs .