Amazon Secrets Manager is a service that securely stores, manages, and retrieves sensitive information like database credentials, API keys, and secrets. It helps automate secret rotation and access control to enhance security.
Integrating your application with Amazon Secrets Manager enables secure storage, management, and retrieval of credentials, API keys, and other secrets.
Authentication
Before you begin, make sure you have the following information:
Connection Name
: Select a descriptive name for your connection, like "MyAppAmazonSecretsManagerIntegration". This helps in easily identifying the connection within your application or integration settings.Authentication Type
: Amazon Secrets Manager supports Access Token Authentication and IAM Role based authentication.
Access Key Based
Login into Amazon AWS Console and search for “
Users
” in the search bar present at the top of the console’s home page.Click on “
Create user
” at the top right corner.Sign in to the AWS Management Console by going to the AWS Management Console (https://console.aws.amazon.com/).
Navigate to the IAM (Identity and Access Management) dashboard by searching in the "
IAM
" search bar.Click on “
Create user
” button present at the top right corner of the page.Provide the username and select permissions (SecretsManagerReadWrite) policies by selecting “
Attach policies directly
” and click on createuser
button.Once the user is created, click on the username of the user created and under the summary section click on create access key.
Select “
Command Line Interface
” as the use case and provide the description tag to the key and click on “create access key.”Treat the access key and secret access key with high confidentiality, as it allows access to your Secrets Manager account.
IAM Role Based
Sign in to AWS Management Console (https://console.aws.amazon.com/) and select security credentials.
Navigate to the IAM dashboard and click "
Roles
" > "Create role
". (https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html)Under "
Trusted entity type
," choose the AWS account option.Select "
Another AWS account
" and input the UnifyApps AWS account ID (contact support to obtain this).Check the "
Require external ID
" box and enter the External ID provided by UnifyApps.Assign the necessary permissions for UnifyApps to operate automated workflows within your account.
Give the IAM role a name and description.
Click the "
Select trusted entities
" Edit button to modify trusted entity policies if needed. (Optional)Click the "
Add permissions
" Edit button to adjust permissions. (Optional)If using object tags, select an appropriate tag for the IAM role. (Optional)
Click on Create Role to finalize the process.
Create an IAM Permissions Policy
Go to the AWS Console and open the IAM console (https://console.aws.amazon.com/iam).
Navigate to
Access management
and selectPolicies
.Choose
Create Policy
.Locate and choose the AWS service that UnifyApps will access.
Select the required permissions under the Actions field.
Define the resources that the role will have access to.
Continue clicking Next until you reach the Review policy page.
Provide a Name for the policy.
Click
Create policy
once done.
Retrieve IAM Role ARN
Open the AWS Console and go to
My Security Credentials
>Roles
.Search for the IAM role you need for the connection.
Select the role to view its details.
Copy the Role ARN for use in the UnifyApps connection setup.
Actions
Actions | Description |
| Creates a new secret in Amazon Secrets Manager |
| Deletes a secret in Amazon Secrets Manager |
| Retrieves detailed information about a secret stored in Amazon Secrets Manager |
| Fetches a randomly generated password in Amazon Secrets Manager |
| Gets the resource policy in AWS Secrets Manager |
| Lists the versions of a secret in Amazon Secrets Manager |
| Lists all secrets stored within the specified region in Amazon Secrets Manager |
| Lists stored secrets in Amazon Secrets Manager |
| Stores a new secret value in an existing secret in Amazon Secrets Manager |
| Retrieves the value of a secret stored in Amazon Secrets Manager |
| Tags a resource in AWS Secrets Manager |
| Updates a secret in AWS Secrets Manager |