AWS Secrets Manager
The AWS Secrets Manager destination enables Vault to sync and unsync secrets of your choosing into an external AWS account. When configured, Vault will actively maintain the state of each externally-synced secret in realtime. This includes sending new secrets, updating existing secret values, and removing secrets when they either get dissocaited from the destination or deleted from Vault.
Setup
The use of this sync destination requires prerequesite setup before beginning to configure it. Either an IAM User or an IAM role must be set with the necessary policies in order for Vault to manage secrets in the external destination. It is this IAM User or IAM Role in AWS for which access credentials will be generated, then provided to Vault during configuration.
The following is an example policy outlining the required permissions to use secrets syncing:
Usage
When AWS credentials have been obtained, Vault can be configured to create an AWS destination, then begin to associate your secrets with this destination.
Store any KV secret into Vault, like so:
Output:
Configure the sync destination:
Output:
Set a secret to be associated with the configured secret destination:
Output:
Troubleshooting
...
API
The AWS Secrets Manager destination has a full HTTP API. Please see the secrets sync API for more details.