Skip to main content

External Secrets Manager

Overview

The External Secrets Manager page helps you integrate and manage external secrets from AWS and Azure within the Cinchy platform.

Prerequisites

To use the External Secrets Manager, it's important to have the following:

  • Working knowledge of how to configure secrets on either AWS or Azure platforms.
  • An understanding of the Cinchy secrets manager.

Supported types

The External Secrets Manager supports the following types of authentication from AWS and Azure:

AWS

  1. AWS access keys for IAM users
  2. IAM roles
info

The IAM role must be assigned to the web pod the same way it is done for connections.

Azure

  1. Managed identities (when Cinchy Web is hosted on Azure)
  2. Registered applications

Table overview

The External Secrets Manager table has the following unique columns:

Column NameDescription
NameUnique name of the external secret.
TypeLists the platform type of the secret. Options include AWS Secrets Manager or Azure Key Vault.
Parameters JSONThe JSON object that contains the mandatory information for each secret type. Refer to the JSON requirements section for more details.
Read GroupsThe Cinchy Groups that have read access to the record.
Write GroupsThe Cinchy Groups that have write access to the record.
IDThe auto-generated GUID.
ID OverrideThe value you enter into this field will override ID.
Sync GUIDThe Sync GUID is used to facilitate DXD Workflows.
DescriptionUseful to help others understand the usage/purpose of the secret.

Parameters JSON

Each secret type has a JSON schema (Parameters JSON) that must be filled with mandatory values. Select the tabs below for a description and example of each JSON schema.

KeyDescriptionExample
authTypeMandatory. Indicates the type of authentication used. "AWS Access Key" signifies the use of an AWS Access Key for authentication."AWS Access Key"
parametersA nested JSON object containing specific configuration details.
regionMandatory. Specifies the AWS region."ca-central-1"
accessKeyMandatory. The AWS Access Key ID, part of the credentials used to authenticate and authorize AWS service requests."AKIAIOSFODNN7EXAMPLE"
secretAccessKeyMandatory. The Secret Access Key associated with the Access Key ID, used for secure AWS service requests."wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY"

Access Key example

{
"authType": "AWS Access Key",
"parameters": {
"region": "ca-central-1",
"accessKey": "AKIAIOSFODNN7EXAMPLE",
"secretAccessKey": "wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY"
}
}

Set up an external secret

To set up an external secret, do the following:

Configure your secret

  1. Create your secret using the preferred platform and secret type (Create an AWS Secrets Manager secret, Set and retrieve a secret from Azure Key Vault using the Azure portal).
  2. In the External Secrets Manager table, enter a unique name for your configuration.
  3. Select the platform type under the Type column.
  4. Select a JSON schema from the JSON schema section and enter the mandatory information for your secret.
  5. Copy the schema into the Parameters JSON column.

Use external secrets in Cinchy

To use the external secrets from the External Secrets Manager table as secrets in Cinchy, such as in a data sync, do the following:

  1. In the Secrets table, select the External view.
  2. In the Secret Source column, select "External".
  3. Select a Domain and enter a Name for your secret.
  4. In the External Secret Manager column, select the ID or unique name of your external secret.
  5. In the External Secret Identifier column, enter the name of the secret as it appears in AWS or Azure.
  6. If your secret consists of multiple key value pairs, enter the name of the key for this secret in the Sub Key column.

Image 1: Example 1

Use encrypted parameters

The External Secrets Manager table also supports encrypted versions of your field, such as a secret access key.

To use an encrypted version, do the following:

  1. Use the Worker CLI --encrypt command on your target parameter.
  2. Copy the value of into the target JSON parameter.

For more information, please see the CLI Command list