Integrating with Credential Vault

Last updated on 26 April, 2024

The Credential Vault integration with collector makes it possible to store and manage sensitive information (including credentials and secrets for hosts, devices, services, etc.) in an external credential vault. 

Collector supports the following vault integrations:

Note: Support for the Credential Vault Integration was added in EA Collector 29.108. Refer to the relevant vault integration topics for supported collector versions.

Integrating Credential Vault Properties

To integrate collector with Credential Vault, follow these steps.

1. Navigate to Resource > Device > Collector > Info tab and add vault metadata properties to the collector. For more information, see Adding Vault Properties.

2. Navigate to Settings > Collectors.

3. Under the Collectors tab, select the collector you want to configure.  

4. Select the More option and then select Collector Configuration.

5. Ensure to set the vault.bypass value to false in agent.conf. Additionally, you can add the required agent configuration properties to set the Collector. For more information, see  Collector Configurations.

Collector Configurations

The following table lists the configuration properties to set in the collector agent.conf.

BooleanTRUEIf the value for the property is true, the vault API calls won’t happen.
Note: You must set the property to false, to enable the vault API calls.
Integer60The property specifies the value in minutes for the expiry of the credential in the vault cache on the collector. After this time, the credentials in the vault cache will expire.
Integer15Controls the Credential Vault integration cache expiration refresh delay in seconds.
BooleanFALSEThe property specifies whether the URL cache is enabled or not. By default the property is set as false; however, if the property is set to true the collector caches the URL and secret value. If the URL for lmvault property is found in the URL cache, the respective secret value is returned, else the API call is made to fetch the secret from the vault. Setting this property to ‘true’ should resolve API rate-limiting issues.
Integer1000The property defines the number of URLs that will be stored in the cache.

Adding Vault Properties

For adding vault properties, such as Vault Metadata and Vault Keys, navigate to Resources > Device > Collector, click Info on the Collector page.

Vault Metadata

The following table lists the Vault Metadata properties.

vault.meta.urlThe URL of the vault. 
vault.meta.typeThe type of vault. 
vault.meta.headerThe headers are required for HTTP Get Request. The value for this custom property would be the header separated with & and the header key value separated with = as shown in the below example:
vault.meta.header – Content-Type=application/json&Accept-Encoding=gzip, deflate, br

Vault Keys

Vault keys need to be specified at the device level with suffix .lmvault. 

.lmvaultThe custom property for which value should be retrieved from the Vault must be specified at the device level by adding suffix .lmvault. The value of such property would be the path of the key in the Vault.
For example: ssh.user.lmvault = ssh\ssh.user
In This Article