IBM Cloud Docs
Configuring the IAM credentials engine

Configuring the IAM credentials engine

You can set up IAM credentials for your IBM Cloud® Secrets Manager service instance by configuring the IAM credentials engine.

In Secrets Manager, the IAM credentials engine serves as the backend for the iam_credentials secret type. Before you can create IAM credentials, you must configure the IAM credentials engine for your service instance. You can enable your instance by creating an IAM service authorization, or by entering an API key that is associated with a service ID in your IBM Cloud account.

When using an API key for the engine configuration, the access token that is generated lasts for 60 minutes and will continue to work even if the API key is deleted from IAM. This can be modified by changing the token expiration in IAM settings. Learn more. Note that if the entity that is related to the API key is deleted, the token is invalidated immediately.

When using IAM service authorization for the engine configuration, you can create and manage IAM credential secrets in the same IBM Cloud account as the Secrets Manager instance, as well as from other accounts. API key configuation works only with the account the Secrets Manager instance belongs to.

Before you begin

To configure the IAM credentials engine, be sure that you're assigned the Manager service role on the Secrets Manager instance.

If configuring the IAM credentials engine with an API key, you need a service ID API key with the following access:

If configuring the IAM credenials engine with IAM service authorization, Secrets Manager adds the following two authorization policies on your behalf.

If the account in which you want to generate IAM credentials allows access from specific IP addresses, you must also update the IP address settings in the account to allow incoming requests from Secrets Manager. For more information, see Managing access with context-based restrictions.

Setting up the IAM credentials engine in the UI

Using IAM service authorization

Complete the following steps to configure the IAM credentials engine using IAM service authorization.

To manage IAM credenials from the same IBM Cloud account as your Secrets Manager instance:

  1. In the Secrets engines page, click the IAM credentials tab.
  2. Click Authorize.
  3. Click Configure.

To manage IAM credenials from another IBM Cloud account, manually create the IAM service authorizations.

For the IAM Identity Service service authorization policy:

  1. In the account where you'd like to manage the IAM credentials, go to Manage > Access (IAM).
  2. Select Authorizations from the left pane menu.
  3. Click on Create.
  4. Under Source select Specific account and provide the account ID the Secrets Manager instance belongs to.
    • Service: Secrets Manager.
    • Resources: Specific resources > Service instance and provide the servce instance ID for your Secrets Manager instance.
  5. Under Target select
    • Service: IAM Access Groups Service
    • Resources: All
    • Roles: Operator

For the IAM Access Groups Service service authorization policy:

  1. In the account where you'd like to manage the IAM credentials, go to Manage > Access (IAM).
  2. Select Authorizations from the left pane menu.
  3. Click on Create.
  4. Under Source select Specific account and provide the account ID the Secrets Manager instance belongs to.
    • Service: Secrets Manager.
    • Resources: Specific resources > Service instance and provide the servce instance ID for your Secrets Manager instance.
  5. Under Target select
    • Service: IAM Access Groups Service
    • Resources: All
    • Roles: Groups Service Member Manage

Using API key

Complete the following steps to configure the IAM credentials engine using a Service ID's API key.

  1. In the Secrets engines page, click the IAM credentials tab.
  2. Click Configure IAM credentials engine with API key.
  3. Enter an API key that has access to create and manage other API keys in your account.
  4. Click Configure.

Setting up the IAM credentials engine from the CLI

Using IAM service authorization

Complete the following steps to configure the IAM credentials engine by using an IAM service authorization.

To manage IAM credenials from the same IBM Cloud account as your Secrets Manager instance, run the following commands to add the required IAM service authorization policies:

ibmcloud iam authorization-policy-create secrets-manager iam-identity "Service ID Creator, Operator" --source-service-instance-id SOURCE_SERVICE_INSTANCE_GUID
ibmcloud iam authorization-policy-create secrets-manager iam-groups "Groups Service Member Manage" --source-service-account SOURCE_SERVICE_INSTANCE_GUID
  • Replace SOURCE_SERVICE_INSTANCE_GUID with the Secrets Manager instance service ID. If not provided, the authorization applies to all Secrets Manager instances

To manage IAM credenials from another IBM Cloud account: also include the ACCOUNT_GUID parameter.

  1. Login to the IBM Cloud account with the service IDs you'd like to manage.
  2. Run the following commands add the required IAM service authorization policies:
ibmcloud iam authorization-policy-create secrets-manager iam-identity "Service ID Creator, Operator" --source-service-instance-id SOURCE_SERVICE_INSTANCE_GUID --source-service-account ACCOUNT_GUID 
ibmcloud iam authorization-policy-create secrets-manager iam-groups "Groups Service Member Manage" --source-service-account SOURCE_SERVICE_INSTANCE_GUID --source-service-instance-id ACCOUNT_GUID
  • Replace SOURCE_SERVICE_INSTANCE_GUID with the Secrets Manager instance service ID. If not provided, the authorization applies to all Secrets Manager instances
  • Replace ACCOUNT_GUID with the IBM Cloud account's ID where you want to create IAM credential secrets.

Using API key

Complete the following steps to configure the IAM credentials engine by using a Service ID's API key.

  1. In a terminal window, log in to IBM Cloud through the IBM Cloud CLI.

    ibmcloud login
    
  2. Select the account, region, and resource group where your Secrets Manager service instance is located.

  3. Create a service ID and set it as an environment variable.

    export SERVICE_ID=`ibmcloud iam service-id-create <service_ID_name> --description "<description>" --output json | jq -r ".id"`; echo $SERVICE_ID
    
  4. Manage access for the service ID.

    Assign the service ID permissions to create and manage other service IDs.

    ibmcloud iam service-policy-create $SERVICE_ID --roles Operator --service-name "iam-identity"
    

    Assign the service ID permissions to view and update access groups in your account.

    ibmcloud iam access-group-policy-create $SERVICE_ID --roles Editor --service-name "iam-groups"
    

    Add the service ID to an access group in your account.

    ibmcloud iam access-group-service-id-add <access_group_name> $SERVICE_ID
    

    Create an IBM Cloud API key for your service ID.

    export IBM_CLOUD_API_KEY=`ibmcloud iam service-api-key-create <API_key_name> $SERVICE_ID --description "<description>" --output json | jq -r ".apikey"`
    
  5. Use the API key to configure the IAM credentials engine for your instance.

    To configure a secrets engine from the IBM Cloud CLI, run the ibmcloud secrets-manager configuration-create command.

    ibmcloud secrets-manager configuration-create --configuration-prototype='{"config_type": "iam_credentials_configuration","name": "iam-configuration","api_key": "'$IBM_CLOUD_API_KEY'"}'
    

    Using a Windows™ command prompt (cmd.exe) or PowerShell? If you encounter errors with passing JSON content on the command line, you might need to adjust the strings for quotation-escaping requirements that are specific to your operating system. For more information, see Using quotation marks with strings in the IBM Cloud CLI.

Configuring the IAM credentials engine with the API

For step-by-step instructions to create an IBM Cloud API key with the correct level of access, switch to the UI or CLI steps.

Using IAM service authorization

The following example shows a query that you can use to configure the IAM credentials engine for your instance when using IAM service authorization. Learn more in IBM Cloud IAM's API Docs.

curl -X POST 'https://iam.cloud.ibm.com/v1/policies' -H "Authorization: Bearer $TOKEN" -H 'Content-Type: application/json' -d '{
  "type": "authorization",
  "subjects": [
    {
      "attributes": [
        {
          "name": "accountId",
          "value": "$SOURCE_ACCOUNT_ID"
        },
        {
          "name": "serviceName",
          "value": "secrets-manager"
        },
        {
          "name": "serviceInstance",
          "value": "$INSTANCE_GUID"
        }
      ]
    }
  ],
  "roles":[
        {
          "role_id": "crn:v1:bluemix:public:iam-identity::::serviceRole:ServiceIdCreator"
        },
        {
          "role_id": "crn:v1:bluemix:public:iam::::role:Operator"
        }
  ],
  "resources":[
    {
      "attributes": [
        {
          "name": "accountId",
          "value": "$TARGET_ACCOUNT_ID"
        },
        {
          "name": "serviceName",
          "value": "iam-identity"
        }
      ]
    }
  ]
}'

curl -X POST 'https://iam.cloud.ibm.com/v1/policies' -H "Authorization: Bearer $TOKEN" -H 'Content-Type: application/json' -d '{
  "type": "authorization",
  "subjects": [
    {
      "attributes": [
        {
          "name": "accountId",
          "value": "$SOURCE_ACCOUNT_ID"
        },
        {
          "name": "serviceName",
          "value": "secrets-manager"
        },
        {
          "name": "serviceInstance",
          "value": "$INSTANCE_GUID"
        }
      ]
    }
  ],
  "roles":[
        {
          "role_id": "crn:v1:bluemix:public:iam-groups::::serviceRole:MemberManage"
        }
  ],
  "resources":[
    {
      "attributes": [
        {
          "name":"$TARGET_ACCOUNT_ID",
          "value": "791f5fb10986423e97aa8512f18b7e65"
        },
        {
          "name": "serviceName",
          "value": "iam-groups"
        }
      ]
    }
  ]
}'

The serviceInstance attribute is optional. If omitted the authorization applies to all Secrets Manager instances. The SOURCE_ACCOOUNT_ID and TARGET_ACCOUNT_ID are required wether creating the authorization for the current account or a specific account.

Using API key

The following example shows a query that you can use to configure the IAM credentials engine for your instance using an API key. When you call the API, replace the API key variables and IAM token with the values that are specific to your Secrets Manager instance.

curl -X POST 
  --H "Authorization: Bearer {iam_token}" \
  --H "Accept: application/json" \
  --H "Content-Type: application/json" \
  --d '{ 
    "api_key": "{iam_apikey}", "config_type": "iam_credentials_configuration", 
    "name": "iam-configuration" 
    }' \ 
  "https://{instance_ID}.{region}.secrets-manager.appdomain.cloud/api/v2/configurations"

A successful response returns the ID value of the secret, along with other metadata. For more information about the required and optional request parameters, see Create a secret.

Configuring the IAM credentials engine with Terraform

The following example shows a query that you can use to configure a secrets engine for your instance when using an IAM service authorization.

    resource "ibm_sm_iam_credentials_configuration" "iam_credentials_configuration" {
        instance_id = local.instance_id
        region = local.region
        name = "iam_credentials_config"
        api_key = var.ibmcloud_api_key
    }

The following example shows a configuration that you can use to configure the IAM credentials engine by using a Service ID's API key.

    resource "ibm_sm_iam_credentials_configuration" "iam_credentials_configuration" {
        instance_id = local.instance_id
        region = local.region
        name = "iam_credentials_config"
        api_key = var.ibmcloud_api_key
    }

Retrieving an IAM credentials engine's configuration value in the UI

You can retrieve an engine's configuration by using the Secrets Manager UI. Retreiving a configuration is valid only when configuring the IAM credentials engine with an API key.

  1. In the IAM credentials secret engine, click the Actions menu Actions icon to open a list of options for your engine configuration.
  2. To view the configuration value, click View configuration.
  3. Click Confirm after you ensure that you are in a safe environment.

The secret value is displayed for 15 seconds, then the dialog closes.

Retrieving an engine's configuration value using CLI

You can retrieve an engine's configuration by using the Secrets Manager CLI. In the following example command, replace the engine configuration name with your configuration's name. Retreiving a configuration is valid only when configuring the IAM credentials engine with an API key.

ibmcloud secrets-manager configuration --name EXAMPLE_CONFIG --service-url https://{instance_ID}.{region}.secrets-manager.appdomain.cloud

Replace {instance_ID} and {region} with the values that apply to your Secrets Manager service instance. To find the endpoint URL that is specific to your instance, you can copy it from the Endpoints page in the Secrets Manager UI. For more information, see Viewing your endpoint URLs

Retrieving an engine's configuration value using API

You can retrieve an engine's configuration by using the Secrets Manager API. In the following example request, replace the engine configuration name with your configuration's name. Retreiving a configuration is valid only when configuring the IAM credentials engine with an API key.

curl -X GET --location --header "Authorization: Bearer {iam_token}" \
--header "Accept: application/json" \
"https://{instance_ID}.{region}.secrets-manager.appdomain.cloud/api/v2/configurations/{name}"

Replace {instance_ID} and {region} with the values that apply to your Secrets Manager service instance. To find the endpoint URL that is specific to your instance, you can copy it from the Endpoints page in the Secrets Manager UI. For more information, see Viewing your endpoint URLs

A successful response returns the value of the engine configuration, along with other metadata. For more information about the required and optional request parameters, see Get configuration.

Next steps

Now you can use Secrets Manager generate IAM credentials. In the Secrets Manager UI, click Secrets > Add > IAM credentials to start creating secrets.