The Akeyless Dev Hub

If you're looking for help with the only zero-trust, SaaS, unified platform for secrets management - you've come to the right place.

This is our documentation and updates center.

Documentation

RabbitMQ Dynamic Secrets

The RabbitMQ producer generates user credentials dynamically based on configured permissions.

Akeyless Vault makes use both of its own internal revocation system and also deletes RabbitMQ users to ensure they become invalid within a reasonable time of the lease expiring.

Prerequisites

To create a producer:

  1. Ensure you have RabbitMQ user privileges to create other users.
  2. Install and run the Akeylss Gateway.

RabbitMQ Producer Configuration

  1. Navigate to localhost:8000 and log in using your Gateway credentials.
  2. Navigate to Dynamic Secrets from the left navigation panel:
Create a new dynamic secretCreate a new dynamic secret

Create a new dynamic secret

  1. Select New=>RabbitMQ Producer. The Create a new RabbitMQ Producer window pops up:
Create a new RabbitMQ ProducerCreate a new RabbitMQ Producer

Create a new RabbitMQ Producer

  1. RabbitMQ distinguishes between configure, write and read operations on a resource. In order to perform an operation on a resource, the user must have been granted the appropriate permissions for it. The RabbitMQ docs outline the relevant resources and operations. Accordingly, complete the producer values in order to enable specified permissions and access to RabbitMQ operations and resources when using the relevant dynamic key, as described in the following table:

Field

Description

Server URI

Enter the RabbitMQ server address. This must be the HTTP API management (usually 15672 port).

Admin User

Enter your RabbitMQ admin credentials. These should be credentials that enable you to create other users.

Admin Password

Enter your RabbitMQ admin credentials. These should be credentials that enable you to create other users.

Refer to the RabbitMQ docs for more information about authentication and authorization in RabbitMQ.

User Configuration Permission

All of the "user" fields in this dialog box are the fields in which you configure access and authorization to RabbitMQ for the users who can use the relevant dynamic key.

Enter the resources for which configure can be performed when accessed using the relevant dynamic key.

User Write Permission

All of the "user" fields in this dialog box are the fields in which you configure access and authorization to RabbitMQ for the users who can use the relevant dynamic key. Granting write permissions.

Enter the resources for which write can be performed when accessed using the relevant dynamic key.

User Read Permission

All of the "user" fields in this dialog box are the fields in which you configure access and authorization to RabbitMQ for the users who can use the relevant dynamic key. Granting read permissions.

Enter the resources for which read can be performed when accessed using the relevant dynamic key.

User Virtual Host

All of the "user" fields in this dialog box are the fields in which you configure access and authorization to RabbitMQ for the users who can use the relevant dynamic key.

In RabbitMQ, user permissions are granted per vhost. Bind the user to the specific vhost (default “/”).

User Tags

All of the "user" fields in this dialog box are the fields in which you configure access and authorization to RabbitMQ for the users who can use the relevant dynamic key.

Management UI access in RabbitMQ can be controlled with user tags. Insert relevant user tags in a comma-separated list, including these tags:

  • management
  • administrator
  • monitoring
  • policymaker

Encrypt dynamic secret with the following Key

To enable zero-trust, select a key with a Customer Fragment. For more information about zero-trust, see Zero Trust Encryption .

Updated 2 months ago

RabbitMQ Dynamic Secrets


Suggested Edits are limited on API Reference Pages

You can only suggest edits to Markdown body content, but not to the API spec.