Skip to content

Commit 5d63df8

Browse files
authored
Added secrets lookup section (RedHatInsights#1081)
* Added secrets lookup section Added the information for AWS Secrets Lookup Manager Add missing AWS Secrets Manager credential https://issues.redhat.com/browse/AAP-21325 * Added secrets lookup section Corrections from review comments Add missing AWS Secrets Manager credential https://issues.redhat.com/browse/AAP-21325
1 parent fbf4926 commit 5d63df8

File tree

5 files changed

+30
-1
lines changed

5 files changed

+30
-1
lines changed

downstream/assemblies/platform/assembly-controller-secret-management.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ With external credentials backed by credential plugins, you can map credential f
99

1010
{ControllerNameStart} provides a secret management system that include integrations for:
1111

12+
* AWS Secrets Manager Lookup
1213
* Centrify Vault Credential Provider Lookup
1314
* _CyberArk Central Credential Provider_ Lookup (CCP)
1415
* CyberArk Conjur Secrets Manager Lookup
@@ -23,6 +24,7 @@ For more information on specifying these credentials in the User Interface, see
2324

2425
include::platform/proc-controller-configure-secret-lookups.adoc[leveloffset=+1]
2526
include::platform/ref-controller-metadata-credential-input.adoc[leveloffset=+2]
27+
include::platform/ref-aws-secrets-manager-lookup.adoc[leveloffset=+2]
2628
include::platform/ref-centrify-vault-lookup.adoc[leveloffset=+2]
2729
include::platform/ref-cyberark-ccp-lookup.adoc[leveloffset=+2]
2830
include::platform/ref-cyberark-conjur-lookup.adoc[leveloffset=+2]
44 KB
Loading

downstream/modules/platform/proc-controller-configure-secret-lookups.adoc

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ Use the following procedure to use {ControllerName} to configure and use each of
1515
.Procedure
1616
. Create an external credential for authenticating with the secret management system. At minimum, provide a name for the external credential and select one of the following for the *Credential Type*:
1717
+
18-
* xref:ref-controller-metadata-credential-input[Metadata for credential input sources]
18+
* xref:ref-aws-secrets-manager-lookup[AWS Secrets Manager Lookup]
1919
* xref:ref-centrify-vault-lookup[Centrify Vault Credential Provider Lookup]
2020
* xref:ref-cyberark-ccp-lookup[CyberArk Central Credential Provider (CCP) Lookup]
2121
* xref:ref-cyberark-conjur-lookup[CyberArk Conjur Secrets Manager Lookup]
@@ -39,6 +39,7 @@ image:credentials-link-credential-prompt.png[Credentials link]
3939
This takes you to the *Metadata* tab of the input source.
4040
This example shows the Metadata prompt for HashiVault Secret Lookup.
4141
Metadata is specific to the input source you select.
42+
4243
For more information, see the xref:ref-controller-metadata-credential-input[Metadata for credential input sources] table.
4344
+
4445
image:credentials-link-metadata-prompt.png[Metadata]
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
[id="ref-aws-secrets-manager-lookup"]
2+
3+
= AWS Secrets Manager Lookup
4+
5+
This plugin enables {AWS} to be used as a credential input source to pull secrets from the {AWS} Secrets Manager.
6+
The AWS Secrets Manager provides similar service to {Azure} Key Vault, and the AWS collection provides a lookup plugin for it.
7+
8+
When AWS Secrets Manager lookup is selected for Credential Type, provide the following metadata to configure your lookup:
9+
10+
* *AWS Access Key* (required): provide the access key used for communicating with AWS key management system
11+
* *AWS Secret Key* (required): provide the secret as obtained by the AWS IAM console
12+
13+
The following is an example of a configured AWS Secret Manager credential.
14+
15+
image::credentials-create-aws-secret-credential.png[Create AWS secret]

downstream/modules/platform/ref-controller-metadata-credential-input.adoc

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,17 @@
22

33
= Metadata for credential input sources
44

5+
[discrete]
6+
== AWS Secrets Manager Lookup
7+
8+
[cols="25%,50%",options="header"]
9+
|===
10+
| Metadata | Description
11+
| AWS Secrets Manager Region (required) | The region where the secrets manager is located.
12+
| AWS Secret Name (required) | Specify the AWS secret name that was generated by the AWS access key.
13+
|===
14+
15+
516
[discrete]
617
== CyberArk Central Credential Provider Lookup
718

0 commit comments

Comments
 (0)