Cloud credentials
-
- UpdatedJan 30, 2025
- 5 minutes to read
- Yokohama
- External Credential Storage
Cloud credential types manage access to cloud-based applications, including Amazon Web Services and the Microsoft Azure cloud.
AWS Identity and Access Management (IAM) roles
If you have a MID Server installed on Amazon EC2 in an AWS cloud, and if that MID Server is configured to discover resources within the cloud, you can use security credentials provided by AWS Identity and Access Management (IAM) roles rather than credentials managed on your instance. These AWS credentials grant permissions in the cloud through an instance profile, based on roles. These credentials are temporary and rotate automatically on a configurable interval. When an IAM role is defined on the MID server. For details, see Configure the MID Server for AWS IAM roles.
Discovery ignores any credentials stored on the instance in favor of the credentials granted by the role in the instance profile. For more information on AWS instance profiles, see IAM Roles for Amazon EC2.
AWS credentials
Azure Service Principal credential form fields
Azure Enterprise Agreement credentials
Field | Description |
---|---|
Name | Enter a descriptive name. |
Enrollment number | Enter the enrolment number from Azure. |
Access Key | Paste the access key that Azure provides. |
Cloud Management credentials
Field | Input value |
---|---|
Name | Enter a unique and descriptive name for this credential. For example, you might call it Cloud Atlanta. |
Active | Enable or disable these credentials for use. |
Type | Specify AWS. |
User name | Enter the CIM user name to create in the Credentials table. Avoid leading or trailing spaces in user names. A warning appears if the platform detects leading or trailing spaces in the user name. |
Password | Enter the CIM password. |
SSH Passphrase | Enter a memorable phrase for key generation. For example, you might enter Friday is a good day. |
SSH private key | Enter the SSH private key. |
Authentication protocol | Select the MD5or SHA authentication protocol that was used to generate the Authentication Key. |
Authentication Key | Enter a SSH-generated authentication key. |
Privacy protocol | Enter one of the following privacy protocols that describes
encryption for the Privacy Key:
|
Enter an additional privacy key. | |
Credential alias | Allow workflow creators to assign individual credentials to any activity in an Orchestration workflow or assign different credentials to each occurrence of the same activity type in an Orchestration workflow. |
External credential store | Select this check box to use an external credential storage system. When you select this option the User name and Password fields are replaced with the Credential ID field. Currently, the only supported external storage system is CyberArk. |
Applies to | Select whether to apply these credentials to All MID servers in your network, or to one or more Specific MID servers. Specify the MID Servers that should use these credentials in the MID servers field. |
Classification | Enter the Application Classification for CI discovery. |
Order | Order (sequence) in which Discovery tries this credential as it attempts to log on to devices. The smaller the number, the higher in the list this credential appears. Establish credential order when using large numbers of credentials or when security locks out users after three failed login attempts. If all the credentials have the same order number (or none), the instance tries the credentials in a random order. |