AWS secrets engine
The AWS secrets engine generates AWS access credentials dynamically based on IAM policies.
Use case
Generate time-based access credentials dynamically based on policies and revoke access when lease expires.
Challenge
Many organizations have credentials hard coded in source code, littered throughout configuration files and configuration management tools, and stored in plaintext in version control, wikis, and shared volumes. Safeguarding and ensuring that a credentials isn’t leaked, or in the likelihood it is, that the organization can quickly revoke access and remediate, is a complex problem to solve.
Solution
A dynamic secret is generated on demand and is unique to a client, instead of a static secret, which is defined ahead of time and shared. Vault associates each dynamic secret with a lease and automatically destroys the credentials when the lease expires. Vault supports dynamic secrets with a wide range of systems and is easily extensible with plugins.
400+
unique applications across thousands of nodes
100K+
secrets requests per day
73+
million developers
The AWS secrets engine generates AWS access credentials dynamically based on IAM policies.
The Azure secrets engine dynamically generates Azure service principals along with role and group assignments.
The Google Cloud Vault secrets engine dynamically generates Google Cloud service account keys and OAuth tokens based on IAM policies.
Vault can generate on-demand access to AWS.
Use the database secrets engine to dynamically generate database credentials.
Learn how to inject Vault secrets into Kubernetes pods via a sidecar container.