You can use Google Cloud Key Management Service (Cloud KMS) as a Harness Secret Manager. Once Google KMS is added as a Secrets Manager, you can create encrypted secrets in Google KMS and use them in your Harness account.
For details on Harness Secret Managers, go to Harness Secret Manager Overview.
This topic describes how to add a Google KMS Secret Manager in Harness.
Before you begin
Add a Secret Manager
This topic assumes you have a Harness Project set up. If not, go to Create Organizations and Projects.
You can add a Connector from any module in your Project in Project setup, or in your Organization or Account Resources.
In Connectors, click Connector.
In Secret Managers, click GCP KMS under Secret Managers.
The GCP Key Management Service settings appear.
In Name, enter a name for your Secret Manager. You will use this name to select this Secret Manager when adding or selecting a secret.
Enter a description for your Secret Manager.
Enter tags for your Secret Manager.
Obtain Google Cloud Symmetric Key
To obtain the values for the Details page, you'll need a Google Cloud Symmetric Key.
In the Google Cloud Console, select your project.
Select Security > Key Management.
Select/create a key ring. Select/create a key in the key ring.
To create resources in this or the next step, go to Google Cloud's Creating Symmetric Keys topic. Open the Actions menu (⋮), and then select Copy Resource Name.
A reference to the key is now on your clipboard.
Paste the reference into an editor. You can now copy and paste its substrings into each of the Harness Secret Manager’s Details settings as shown below.
Attach Service Account Key (Credentials) File
Next, you will export your Google Cloud service account key and attach it to the Details page in Harness.
First, you need to grant a Principal the Cloud KMS CryptoKey Encrypter/Decrypter (cloudkms.cryptoKeyEncrypterDecrypter) role.
In Google Cloud Console, go to the IAM page.
Locate the Principal you want to use, and click Edit.
In Edit permissions, add the Cloud KMS CryptoKey Encrypter/Decrypter role, and then select Save.
Go to Google Permissions and roles and Cloud's Using Cloud IAM with KMSCloud's Using Cloud IAM with KMS topics.
Next, you'll select the Service Account for that Principal and export its Key file.
In the Google Cloud Console, in IAM & Admin, go to Service Accounts.
Scroll to the service account for the Principal you gave the Cloud KMS CryptoKey Encrypter/Decrypter role. If no service account is present, create one.
Open your service account's Actions ⋮ menu, then select Manage keys.
Select ADD KEY > Create new key.
In the resulting Create private key dialog, select JSON, create the key, and download it to your computer.
Return to the Secret Manager's Details page in Harness.
Under GCP KMS Credentials File, click Create or Select a Secret. You can create a new File Secret and upload the key file you just exported from Google Cloud.
Click Save and then Continue.
Set up delegates
In Delegates Setup, use Selectors to select any specific delegates that you want this Connector to use. Click Save and Continue.
In Connection Test, click Finish after your connection is successful.