Secrets Management Integration

A secret, such as a password, is considered sensitive data, and it is used in interfaces, Environments and Fabric System Database as a way to enable communication with external systems. Hence, secrets should be protected and suitably stored. Click here for further information about secured storage of secrets in Fabric.

Fabric also supports integration with Secrets Management services as they provide several benefits while secrets are not stored in Fabric itself, only their reference IDs are.

Secrets Management services are tools that aim to securely store, manage, access and audit sensitive information such as passwords, API keys and other credentials, across the organization. The features included in Secrets Management services are encryption, access controls, auditing and automatic rotation of secrets.

Key advantages of Secrets Management services are:

  • Reducing the risk of secret leaks when providing a secret for each client application.
  • Having a single source of truth, which can be better controlled, changed or rotated, manually or automatically.
  • Managing access to secrets with fine-grained authorization policies.
  • Detecting security breaches and unauthorized access attempts. This is done by analyzing audit logs and alerts that provide detailed history of client interactions, which can also be used for guiding security policy enforcement.

These are the Secrets Management service providers currently supported by Fabric, along with their official webpages:

How does it Work

  1. The customer's security team administrator creates a set of credentials on either a database or a similarly secured resource server, and then provisions them as secrets in the Secrets Management service. The latter encrypts and stores the credentials within the secrets.
  2. The administrator has to grant Fabric (client application) with permissions to approach these secrets.
  3. When Fabric opens a connection in order to access the database/resource server via an interface, it examines whether its credentials are defined as reference IDs in an external Secrets Management service. If they are defined as such, Fabric queries the Secrets Management service to retrieve the relevant secrets.
  4. The Secrets Management service decrypts and returns the secrets to Fabric over a secured channel.
  5. Fabric uses the secrets as the resource server credentials, as defined in the interface.
  6. Fabric caches the credentials in memory. If the connection to a resource server fails due to credentials, Fabric assumes that the credentials were changed, and therefore accesses the Secrets Management service again for the purpose of retrieving them.

Using Secrets Management Services

In order to use a Secrets Management service, you should configure and set Fabric using the following 2 components:

  1. config.ini. Set the configuration in the config.ini file with the properties of the selected Secrets Management service, along with the access and permission details. Read here for more details.
  2. Interface Editor. Provision and mark the required interface connection details as those that should be taken from the Secrets Management service, as part of the project's implementation settings. Read here for more details.

Previous

Secrets Management Integration

A secret, such as a password, is considered sensitive data, and it is used in interfaces, Environments and Fabric System Database as a way to enable communication with external systems. Hence, secrets should be protected and suitably stored. Click here for further information about secured storage of secrets in Fabric.

Fabric also supports integration with Secrets Management services as they provide several benefits while secrets are not stored in Fabric itself, only their reference IDs are.

Secrets Management services are tools that aim to securely store, manage, access and audit sensitive information such as passwords, API keys and other credentials, across the organization. The features included in Secrets Management services are encryption, access controls, auditing and automatic rotation of secrets.

Key advantages of Secrets Management services are:

  • Reducing the risk of secret leaks when providing a secret for each client application.
  • Having a single source of truth, which can be better controlled, changed or rotated, manually or automatically.
  • Managing access to secrets with fine-grained authorization policies.
  • Detecting security breaches and unauthorized access attempts. This is done by analyzing audit logs and alerts that provide detailed history of client interactions, which can also be used for guiding security policy enforcement.

These are the Secrets Management service providers currently supported by Fabric, along with their official webpages:

How does it Work

  1. The customer's security team administrator creates a set of credentials on either a database or a similarly secured resource server, and then provisions them as secrets in the Secrets Management service. The latter encrypts and stores the credentials within the secrets.
  2. The administrator has to grant Fabric (client application) with permissions to approach these secrets.
  3. When Fabric opens a connection in order to access the database/resource server via an interface, it examines whether its credentials are defined as reference IDs in an external Secrets Management service. If they are defined as such, Fabric queries the Secrets Management service to retrieve the relevant secrets.
  4. The Secrets Management service decrypts and returns the secrets to Fabric over a secured channel.
  5. Fabric uses the secrets as the resource server credentials, as defined in the interface.
  6. Fabric caches the credentials in memory. If the connection to a resource server fails due to credentials, Fabric assumes that the credentials were changed, and therefore accesses the Secrets Management service again for the purpose of retrieving them.

Using Secrets Management Services

In order to use a Secrets Management service, you should configure and set Fabric using the following 2 components:

  1. config.ini. Set the configuration in the config.ini file with the properties of the selected Secrets Management service, along with the access and permission details. Read here for more details.
  2. Interface Editor. Provision and mark the required interface connection details as those that should be taken from the Secrets Management service, as part of the project's implementation settings. Read here for more details.

Previous