Defining Guardium datasources to access AWS Secret Manager
Configure the datasources on your Guardium® system for automatic password provisioning using the AWS Secrets Manager. You can create a new datasource definition or edit an existing definition.
Before you begin
- The name of the AWS Secrets Manager configuration. For more information, see Configuring the AWS Secrets Manager on your Guardium system.
- The secret name. For more information, see Creating a secret key.
- The location of your AWS data center, hostname, port number, and service name. For more information, see Gathering required information from AWS Secrets Manager.
Procedure
- To access an existing datasource definition, go to Creating a datasource definition. , and click . To create a new datasource definition, see
- Configure the Credential type by selecting the External password radio button.
- In the External password type Location drop-down, select AWS Secrets Manager.
- In the AWS Secrets Manager config drop-down, select the name of the AWS Secrets Manager configuration.
- In the Secret name field, enter the secret name that you created on your AWS management console.
- Enter the Region location of your data center that is configured on your AWS management console.
- Enter the Host name/IP, Port number, and Service name that you gathered from your AWS management console.
- Click Save and Test connection to ensure that the Guardium system can connect to the AWS Secrets Manager and fetch the datasource credential.
What to do next
Repeat steps 2 to 8 to configure all your Guardium datasources to access the AWS Secrets Manager.