Skip to main content

Add an AWS KMS Secrets Manager

This content is for Harness FirstGen. Switch to NextGen.To store and use encrypted secrets (such as access keys) and files, you can add an AWS KMS Secrets Manager.

In this topic:

Before You Begin

Step 1: Configure Secrets Manager

  1. In Security, select Secrets Management, and then click Configure Secrets Managers.
    In the Secrets Managers page, the Status column indicates the Default provider.
  2. Click Add Secrets Manager. The Configure Secrets Manager settings appear.
  3. Select AWS KMS from the drop-down list.

Step 2: Display Name

Enter a name for this secrets manager.

Option: Credentials Type

You can select the following options for authenticating with AWS:

  • Assume IAM Role on Delegate.
  • Enter AWS Access Keys Manually.
  • Assume Role Using STS on Delegate.

Option: Assume IAM Role on Delegate

If you select Assume the IAM Role on Delegate, Harness will authenticate using the IAM role assigned to the AWS host running the Delegate you select using a Delegate Selector.

Delegate Selector

In Delegate Selector, enter the Selector of the Delegate that this Secrets Manager will use for all connections. For information about Selectors, see Select Delegates for Specific Tasks with Selectors.

Option: AWS Access Keys Manually

Use your AWS IAM user login credentials.

Either from the JSON for the Key Policy, or in the AWS IAM console, under Encryption keys, gather the AWS Access Key ID, AWS Secret Key, and AWS Resource Name (ARN).

For more information, see Finding the Key ID and ARN from Amazon.

Access Key

The AWS Access Key ID for the IAM user you want to use to connect to Secrets Manager.

Secret Key

Paste in the contents of the Secret Key corresponding to the Access Key ID.

Option: Assume Role Using STS on Delegate

This option uses the AWS Security Token Service (STS) feature. Typically, you use AssumeRole within your account or for AWS cross-account access.

Role ARN

Enter the Amazon Resource Name (ARN) of the role that you want to assume. This is an IAM role in the target deployment AWS account.

External ID

If the administrator of the account to which the role belongs provided you with an external ID, then enter that value.

For more information, see How to Use an External ID When Granting Access to Your AWS Resources to a Third Party from AWS.

Assume Role Duration

This is the AssumeRole Session Duration. See Session Duration in the AssumeRole AWS docs.

Step 3: Key ARN

Enter the Amazon Resource Name (ARN) for the customer master key (CMK).

Step 4: Region

Select the AWS Region for the Secrets Manager.

Step 5: Usage Scope

See Scope Secret Managers to Applications and Environments.