HashiCorp

Credential Manager stores API keys, passwords, certificates, and other sensitive data securely and helps to manage, access, rotate, and audit secrets.

In the OvalEdge application, the credential manager unfolds an additional layer of security by reading connector credentials in real-time from the credential manager.

Example: If the Snowflake connection is configured with the credentials manager, then connectivity information like the Username and Password of the Service account will be read in real-time from the credentials manager whenever OvalEdge tries to connect to Snowflake.

Credential Managers Supported by OvalEdge

OvalEdge supports four types of credential managers to manage the connector credentials.

  • OE Credential Manager

  • AWS Secrets Manager

  • HashiCorp

  • AzureKeyVault

Note: To store and manage the credentials of a particular connection, an integration to a credential manager needs to be established.

HashiCorp

The HashiCorp connector generates and stores the connector secrets (Username and Password) in the HashiCorp database.

Prerequisites

  • Configure the database in HashiCorp.

  • Establish a HashiCorp connection to manage the secrets.

Establish a connection

To establish a connection to HashiCorp,

  1. Navigate to Administrator > Connectors.

  2. Click on the + (New Connector) icon, and the Add Connection with Search Connector pop-up window is displayed.

  3. Add Connector pop-up window is displayed where you can search for the HashiCorp.

  4. The Add Connector with HashiCorp specific details pop-up window is displayed. Enter the relevant information to connect to the HashiCorp connection.

Note: The asterisk (*) denotes mandatory fields required for establishing a connection.

Field Name

Description

Connector Type

By default, the selected connection type is displayed as HashiCorp.

Vault Name*

Enter a name for the HashiCorp connector. You can specify a reference name to identify the HashiCorp connector in OvalEdge.

Example: HashiCorp_sample

Connector Environment

The Connector Environment drop-down list allows you to select the environment configured for the connector from the drop-down list.

For example, PROD, or STG (based on the configured items in the OvalEdge configuration for the connector.environment).

The purpose of the environment field is to help you identify which connector is connecting what type of system environment (Production, STG, or QA).

Vault BaseUrl*

Enter the server name/URL to connect to the HashiCorp connector.

Vault Token*

Enter the vault token.

Admin Roles

Integration Admins*

To add Integration Admin Roles, search for or select one or more roles from the Integration Admin options, and then click on the Apply button. The responsibility of the Integration Admin includes configuring crawling and profiling settings for the connector, as well as deleting connectors, schemas, or data objects.

Security and Governance Admins*

To add Security and Governance Admin roles, search for or select one or more roles from the list, and then click on the Apply button. The security and Governance Admin is responsible for:

  • Configure role permissions for the connector and its associated data objects.

  • Add admins to set permissions for roles on the connector and its associated data objects.

  • Update governance roles.

  • Create custom fields.

  • Develop Service Request templates for the connector.

  • Create Approval workflows for the templates.

Select Bridge

By default, the no bridge option will be displayed.

  1. After entering the connection details, select the appropriate button based on your preferences.

  • Validate: Click on the Validate button to verify the connection details. This ensures that the provided information is accurate and enables successful connection establishment.

  • Save: Click on the Save button to store the connection details.

  • Close: Click on the Close button. It closes the pop-up window.

To manage the connection details of an existing connector in the HashiCorp,

  • Select a connector and then click on 9-dots > Edit Connector.

  • The Edit Connector Information window is displayed.

  • Select the HashiCorp option from the Credential Manager drop-down list.

  • Enter Username and Password. Note: For the Username and Password, enter the details in the mentioned leased ID path format, i.e.: Path/User Name and Path/Password (Path refers to the lease ID- Example: [ID database/creds/dynmic_role]).

  • The above entered Username & Password will be fetched from HashiCorp for validating the connection, crawling, and profiling.

  • Validate and save the connection details.

Was this helpful?