Configure endpoint accounts to use secrets
Configure endpoint accounts to use secrets.
To retrieve secrets stored in a secrets manager, such as an access token, a username, or a password, that field in the endpoint account must be expression-enabled. Expression-enabled fields have an expression button .
To use managed identity-based authentication mode in the Snaps, set up the SnapLogic account using an expression
that calls secrets.read
with the alias name for the secret object.
The request Authorization header
contains
the secret. Because REST Snaps can preview a complete request, you might want to limit access to
resources that use secrets.
- A subscription to SnapLogic Secrets Management
- A secrets manager configured with storage, roles, permissions, and secrets
- A Groundplex configured to communicate with the secrets manager
The S3 Dynamic Account has several expression-enabled fields, including Access-key ID and Secret Key. You can store the values for these fields in AWS Secrets Manager with role-based authentication.
- Create the secrets in AWS Secrets Manager:
myaccesskey
mysecretkey
- Create or modify an S3 Dynamic Account.
- In the Access-key ID field, click the expression button () and enter
secrets.read("DEFAULT_AWS", "").myaccesskey
. - In the Secret Key field, click the expression button () and enter
secrets.read("DEFAULT_AWS", "").mysecretkey
.
- In the Access-key ID field, click the expression button () and enter