Skip to content

Commit 51f6f9b

Browse files
authored
AAP-46850 Document external credential support in EDA (#4099) (#4106)
* AAP-46850 Document external credential support in EDA * AAP-46850 Minor fixes for peer review * AAP-46850 Fixed title in last link in external credentials module * AAP-46850 Fixed title in last link in external credentials module
1 parent 15b2a7c commit 51f6f9b

File tree

2 files changed

+29
-3
lines changed

2 files changed

+29
-3
lines changed

downstream/assemblies/eda/assembly-eda-credential-types.adoc

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,13 +3,15 @@
33

44
= Credential types
55

6-
{EDAcontroller} comes with several built-in credental types that you can use for syncing projects, running rulebook activations, executing job templates through {MenuTopAE} ({ControllerName}), fetching images from container registries, and processing data through event streams.
6+
{EDAcontroller} comes with several built-in credential types that you can use for syncing projects, running rulebook activations, executing job templates through {MenuTopAE} ({ControllerName}), fetching images from container registries, and processing data through event streams.
77

8-
These built-in credential types are not editable. So if you want credential types that support authentication with other systems, you can create your own credential types that can be used in your source plugins. Each credential type contains an input configuration and an injector configuration that can be passed to an Ansible rulebook to configure your sources.
8+
These built-in credential types are not editable. So if you want credential types that support authentication with other systems, you can create your own credential types that can be used in your source plugins. Each credential type contains an input configuration and an injector configuration that can be passed to an Ansible rulebook to configure your sources. For more information, see link:https://docs.redhat.com/en/documentation/red_hat_ansible_automation_platform/2.5/html/using_automation_decisions/eda-credential-types#eda-custom-credential-types[Custom credential types].
99

10-
For more information, see link:https://docs.redhat.com/en/documentation/red_hat_ansible_automation_platform/2.5/html/using_automation_decisions/eda-credential-types#eda-custom-credential-types[Custom credential types].
10+
If you will be executing job templates through {ControllerName}, you can retrieve credential values from external secret management systems listed in link:https://docs.redhat.com/en/documentation/red_hat_ansible_automation_platform/2.5/html/using_automation_decisions/eda-credential-types#eda-external-credential-types[External secret management credential types].
1111

1212

13+
include::eda/con-external-credential-types.adoc[leveloffset=+1]
14+
1315
include::eda/con-custom-credential-types.adoc[leveloffset=+1]
1416

1517
include::eda/con-credential-types-input-config.adoc[leveloffset=+2]
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
:_mod-docs-content-type: <CONCEPT>
2+
[id="eda-external-credential-types"]
3+
4+
= External secret management credential types
5+
6+
In addition to the built-in credential types, {EDAName} supports a variety of external secret management credential types. These credential types allow rulebooks to securely retrieve sensitive information, such as API keys and passwords, directly from your organization's centralized secret vault.
7+
8+
The following external credential types are available for use in {EDAcontroller}:
9+
10+
* AWS Secrets Manager
11+
* Azure Key Vault
12+
* Centrify Vault Credential Provider
13+
* CyberArk Central Credential Provider
14+
* CyberArk Conjur Secrets Manager
15+
* HashiCorp Vault Secret
16+
* HashiCorp Vault Signed SSH
17+
* Thycotic DevOps Secrets Vault
18+
* Thycotic Secret Server
19+
* GitHub App Installation Access Token
20+
21+
The process for using these credentials in a rulebook activation is consistent with how they are used in {ControllerName}. For more information, see link:https://docs.redhat.com/en/documentation/red_hat_ansible_automation_platform/2.5/html/configuring_automation_execution/assembly-controller-secret-management[Secret management system].
22+
23+
.Additional references
24+
* link:https://docs.redhat.com/en/documentation/red_hat_ansible_automation_platform/2.5/html/configuring_automation_execution/index[Configuring automation execution]

0 commit comments

Comments
 (0)