-
Notifications
You must be signed in to change notification settings - Fork 532
Secret Provider Setup Example
Note: This feature is available in Enterprise and AWS editions only.
This guide shows a basic setup for a secret provider using the web UI. The example uses HashiCorp Vault, but the same approach applies to other providers.
-
Open the Vault UI.
-
Go to Secrets Engines.
-
Click Enable new engine +.
-
Select KV, set Path to
secret, and click Enable Engine.
Tip: If KV is already enabled, reuse the existing mount path.
-
Go to Secrets Engines -> secret.
-
Click Create secret +.
-
Enter name.
-
Add key-value pairs.

-
Click Save.
-
Start creating a connection.
-
In the Create Connection wizard, go to the Main tab, choose a Configuration Name and enter the Secret Name in the Secret Parameters section.

Note: Secret name format depends on the provider. See Secret name format.
-
If required fields are missing in the secret, enter them manually.
-
Click Test to verify your settings.
-
Click Create to save the connection.
- Getting started
- Create connection
- Connection network options
- Supported databases
-
Drivers management
- Database authentication methods
- Database navigator
- Properties editor
- Data editor
- SQL editor
-
Entity relation diagrams
- Cloud services
- Data transfer
- General user guide
- Administration
- Server configuration
-
Server security and access configuration
- Authentication methods
- Access management
- Proxy configuration
-
Secret management
- Logs
-
Query manager
- Workspace location
- Command line parameters
-
Session manager
- Deployment options
- CloudBeaver Editions
- FAQ
- Development