Add an AWS KMS Secrets Manager
This content is for Harness FirstGen. Switch to NextGen.To store and use encrypted secrets (such as access keys) and files, you can add an AWS KMS Secrets Manager.
In this topic:
- Before You Begin
- Step 1: Configure Secrets Manager
- Step 2: Display Name
- Option: Credentials Type
- Option: Assume IAM Role on Delegate
- Option: AWS Access Keys Manually
- Option: Assume Role Using STS on Delegate
- Step 3: Key ARN
- Step 4: Region
- Step 5: Usage Scope
Before You Begin
Step 1: Configure Secrets Manager
- In Security, select Secrets Management, and then click Configure Secrets Managers.
In the Secrets Managers page, the Status column indicates the Default provider. - Click Add Secrets Manager. The Configure Secrets Manager settings appear.
- Select AWS KMS from the drop-down list.
Step 2: Display Name
Enter a name for this secrets manager.
Option: Credentials Type
You can select the following options for authenticating with AWS:
- Assume IAM Role on Delegate.
- Enter AWS Access Keys Manually.
- Assume Role Using STS on Delegate.
Option: Assume IAM Role on Delegate
If you select Assume the IAM Role on Delegate, Harness will authenticate using the IAM role assigned to the AWS host running the Delegate you select using a Delegate Selector.
Delegate Selector
In Delegate Selector, enter the Selector of the Delegate that this Secrets Manager will use for all connections. For information about Selectors, see Select Delegates for Specific Tasks with Selectors.
Option: AWS Access Keys Manually
Use your AWS IAM user login credentials.
Either from the JSON for the Key Policy, or in the AWS IAM console, under Encryption keys, gather the AWS Access Key ID, AWS Secret Key, and AWS Resource Name (ARN).
For more information, see Finding the Key ID and ARN from Amazon.
Access Key
The AWS Access Key ID for the IAM user you want to use to connect to Secrets Manager.
Secret Key
Paste in the contents of the Secret Key corresponding to the Access Key ID.
Option: Assume Role Using STS on Delegate
This option uses the AWS Security Token Service (STS) feature. Typically, you use AssumeRole
within your account or for AWS cross-account access.
Role ARN
Enter the Amazon Resource Name (ARN) of the role that you want to assume. This is an IAM role in the target deployment AWS account.
External ID
If the administrator of the account to which the role belongs provided you with an external ID, then enter that value.
For more information, see How to Use an External ID When Granting Access to Your AWS Resources to a Third Party from AWS.
Assume Role Duration
This is the AssumeRole Session Duration. See Session Duration in the AssumeRole AWS docs.
Step 3: Key ARN
Enter the Amazon Resource Name (ARN) for the customer master key (CMK).
Step 4: Region
Select the AWS Region for the Secrets Manager.