Apono Integration Secret
Last updated
Was this helpful?
Last updated
Was this helpful?
Many integrations require granting Apono connector credentials to allow it to authenticate and connect. You can create secrets in different secrets managers (e.g. AWS, GCP, Azure) and specify them in the integration secret store. This allows the connector to safely and securely retrieve its credentials in order to connect to the desired integration resources.
Apono supports the following secret managers:
Use Apono to store your connector credentials for the desired integration resources.
Using the Apono secret store option is not recommended for production environments.
We suggest creating a secret in one of the supported cloud providers secret manager or in a Kubernetes secret. Storing secrets in a secret manager enables Apono to sync and provision cloud resources without the need to store credentials for a specific environment in Apono.
From your Integration configuration page expand Secret Store, click on the APONO tab and enter the required credentials information for the integration.
installed in your Kubernetes cluster
command-line interface
installed in your Kubernetes cluster
command-line interface
command-line interface
From the , click Store a new secret. The Choose secret type page appears.
command-line interface
command-line interface
Name: Type a name for the secret. The secret name must be unique within a Key Vault. The name must be a 1-127 character string, starting with a letter and containing only 0-9, a-z, A-Z, and -. For more information on naming, see
command-line interface
(enabled once per project)
command-line interface
(enabled once per project)
in the Google Cloud console.
(enabled once per project)
command-line interface
If you did not set the VAULT_ADDR
, VAULT_NAMESPACE
, and VAULT_TOKEN
environment variables, refer to the steps in the tutorial.
You can define HashiCorp vault to fetch secret definition from , , or secret managers using the following environment variable: