Rotated secrets enable you to protect the credentials for privileged-user accounts such as an Administrator account on a Windows server, a root account on a Linux server, or an Admin account on a network device, by resetting its password.
The Akeyless Vault Platform generates a new password, resets it on the target machine, and stores the updated secret value so that it can be retrieved when required.
You can define a rotated secret to automatically update the password at defined intervals, or manually trigger a password update from the CLI or from the Akeyless Console.
You can configure:
- SSH Rotated Secret
- AWS Rotated Secret
- Azure Rotated Secret
- GCP Rotated Secret
- Database Rotated Secret
- Windows Rotated Secret
- Custom Rotated Secret
- LDAP Rotated Secret
- Docker Hub Rotated Secret
The typical flow for working with rotated secrets is:
Create a Target for a Rotated Secret: Get started by defining the target. The rotated secret itself is a user account on the target, for which the password needs to be rotated every X days.
Create an SSH Rotated Secret or Create an AWS Rotated Secret: When you create a rotated secret, you need to name it and define the secret settings, such as how often the secret should be rotated, and the secret target. All secret values are encrypted using patented Akeyless Distributed Fragment Cryptography (DFC) technology.
Add a Rotated Secret to a Role: Enable clients to access the rotated secret by adding it to a role, with the appropriate permissions.
Retrieve a Rotated Secret Value: Get the value of a rotated secret when you need it.
If required, you can manually rotate a secret. See Manually Rotate a Secret.
When a rotated secret becomes obsolete, you can delete it.
Updated about 2 months ago