Fabric supports integration with Secret Manager services, so that secrets - like passwords, used in interfaces that enable communication to external systems - will not be stored in Fabric itself. (For information of how can secrets be securely stored on Fabric - read here)
Secret Manager services are tools aimed for securely storing, managing, accessing and auditing sensitive information such as passwords, API keys, and other credentials, across the organization. Features of Secret Manager services include encryption, access controls, auditing and automatic rotation of secrets.
Such a service has several advantages:
Fabric supports integration with various external Secret Management providers, in which case Fabric doesn't store the secrets but rather their reference IDs.
Supported Secret Management providers are:
In order to use a Secrets Manager:
Each of the supported Secrets Managers has its own dedicated section at config.ini file, with all required access and permissions details.
In addition of populating these details, you shall turn it on, by setting the 'ENABLED' property to be 'true', in the section of the chosen secret manager.
Following are the config attributes required for each secret manger:
section name: [encryption_aws_sm] properties:
section name: [encryption_hashicorp_sm]
The authentication within HashiCorp Vault is done by tokens that can be used directly or by using one of their other auth methods, in which case the token is dynamically generated.
Fabric supports 2 authentication methods:
Directly, where AUTH_TOKEN shall be set.
When using this method, Fabric accesses the Vault URL with the token as the auth credentials, in order to get the secret.
AppRole, which is based on the role that Fabric is associated to at the Vault.
When using this method, Fabric first accesses the approle URL to dynamically get a token, and then uses this token as the auth credentials, in order to get the secret. For this method you shall specify the following attributes:
In addition, this shall be set:
Fabric supports one of the following authentication methods for Azure Key Vault:
section name: [encryption_azure_sm]
To mark an interface connection details property to be taken from the Secrets Manager, you shall use this pattern in its value:
${secretmanager:<id-at-seceret-manager>} For example: ${secretmanager:mysql.password}
Notes:
- Each Secret Manager service has its own pattern, usually by hierarchy; you should follow these patterns.
- The Secret Manager service can be used also for interface connection details inside Environments. Each one of the environments and the interfaces is independent, in a way that some environments may use the Secret Manager service, while others, like local testing, may not.
- You can use the "Test connection" option to verify that the connection settings are OK, also when the Secret Manager service is activated.
- The following properties can be addressed to the Secrets Manager for the DB Interfaces types: host, user, password. For all other interfaces, all connection details properties can be set to use the Secrets Manager.
Fabric supports integration with Secret Manager services, so that secrets - like passwords, used in interfaces that enable communication to external systems - will not be stored in Fabric itself. (For information of how can secrets be securely stored on Fabric - read here)
Secret Manager services are tools aimed for securely storing, managing, accessing and auditing sensitive information such as passwords, API keys, and other credentials, across the organization. Features of Secret Manager services include encryption, access controls, auditing and automatic rotation of secrets.
Such a service has several advantages:
Fabric supports integration with various external Secret Management providers, in which case Fabric doesn't store the secrets but rather their reference IDs.
Supported Secret Management providers are:
In order to use a Secrets Manager:
Each of the supported Secrets Managers has its own dedicated section at config.ini file, with all required access and permissions details.
In addition of populating these details, you shall turn it on, by setting the 'ENABLED' property to be 'true', in the section of the chosen secret manager.
Following are the config attributes required for each secret manger:
section name: [encryption_aws_sm] properties:
section name: [encryption_hashicorp_sm]
The authentication within HashiCorp Vault is done by tokens that can be used directly or by using one of their other auth methods, in which case the token is dynamically generated.
Fabric supports 2 authentication methods:
Directly, where AUTH_TOKEN shall be set.
When using this method, Fabric accesses the Vault URL with the token as the auth credentials, in order to get the secret.
AppRole, which is based on the role that Fabric is associated to at the Vault.
When using this method, Fabric first accesses the approle URL to dynamically get a token, and then uses this token as the auth credentials, in order to get the secret. For this method you shall specify the following attributes:
In addition, this shall be set:
Fabric supports one of the following authentication methods for Azure Key Vault:
section name: [encryption_azure_sm]
To mark an interface connection details property to be taken from the Secrets Manager, you shall use this pattern in its value:
${secretmanager:<id-at-seceret-manager>} For example: ${secretmanager:mysql.password}
Notes:
- Each Secret Manager service has its own pattern, usually by hierarchy; you should follow these patterns.
- The Secret Manager service can be used also for interface connection details inside Environments. Each one of the environments and the interfaces is independent, in a way that some environments may use the Secret Manager service, while others, like local testing, may not.
- You can use the "Test connection" option to verify that the connection settings are OK, also when the Secret Manager service is activated.
- The following properties can be addressed to the Secrets Manager for the DB Interfaces types: host, user, password. For all other interfaces, all connection details properties can be set to use the Secrets Manager.