Managing Credentails
To connect your external account to GDS, you will need to add a secret credential in ICA, and then add a provider specific key to that named secret.
Secret credentials are specific to the service provider. Different providers (such as Amazon Web Services, Google Cloud Platform, or Microsoft Azure) use different methods for authentication, and some services have more than one method of granting credentials.
In the example below, we'll use Amazon Web Services (AWS) with an IAM user. This is the only source available at the moment.
Add an AWS IAM user credential
These operations need to be done as the tenant administrator, so first login on the command line with a tenant administrator account.
In AWS IAM, create the access key and secret key for the user with AWS IAM. Create a local JSON file with those two keys with the following format, replacing the values.
For this example, the filename will be "aws_ica_user.json", and the type will be aws-user.
Create the ICA secret
To create an ICA secret for an AWS IAM user, use the following command. The JSON file provided will be validated for the type you provide, which indicates an AWS IAM user in this case.
Get a secret
To view additional data about the secret, use the secret get command. Note that once created, the secret cannot be retrieved or viewed.
Listing secrets
To view defined secrets, use the secrets list command:
Update a secret
To update a secret, use this command.
Delete a secret
Delete a secret with the following command
Last updated