Integrate with HashiCorp to secure sensitive data
You can integrate HashiCorp Vault with Ansible Automation Platform to manage and retrieve sensitive data.
Configure Ansible Automation Platform to communicate with HashiCorp vault Copy linkLink copied!
In enterprise environments, managing secrets externally is vital. A recommended HashiCorp Vault method uses AppRoles. To use these secrets, configure a new Ansible Automation Platform credential using the HashiCorp Vault Secret Lookup type.
About this task Copy linkLink copied!
Enter relevant information such as an identifiable credential name, organization, and the URL of the vault server, for example, https://vault.domain.com:8200.
Populate the necessary fields with your information such as Token, AppRole role_id, and AppRole secret_id, then select v2 for the API version.
To test the credential to test for functionally and operation, use the following procedure:
Procedure Copy linkLink copied!
Use HashiCorp Vault credentials within Ansible Automation Platform Copy linkLink copied!
To use HashiCorp vault credentials within Ansible Automation Platform, create a new credential with the type Machine Credential. Enter relevant information such as an identifiable credential name and an organization.
About this task Copy linkLink copied!
To configure the use of HashiCorp Vault credentials, use the following procedure:
Procedure Copy linkLink copied!
- To configure the Username, click the
icon. - Select the HashiCorp Vault credentials that were created in step 1.
- Populate Path to Secret and the Key Name.
- Optionally, click . Otherwise, click .
Configure the machine credential’s SSH private key Copy linkLink copied!
Link your machine credential's SSH private key to HashiCorp Vault. Retrieving this key from an external secret management system helps ensure that sensitive authentication details are securely injected into your automation workflows.
Procedure Copy linkLink copied!
- To configure the Username, click the
icon. - Select the HashiCorp Vault credentials that you created.
- Populate the Path to Secret and the Key Name.
- Select the name of the private key as the Key Name.
- Optionally, click . Otherwise, click .