Skip to content

Commit 2aa55bd

Browse files
Patrycjaqooban
andauthored
RD-6402 Update Secrets Widget documentation (#2524)
* RD-6402 Update Secrets Widget documentation * update using_secret page * Update content/working_with/manager/using-secrets.md Co-authored-by: Jakub Niezgoda <jakub.niezgoda@cloudify.co> * Update content/working_with/manager/using-secrets.md Co-authored-by: Jakub Niezgoda <jakub.niezgoda@cloudify.co> * Update content/working_with/manager/using-secrets.md Co-authored-by: Jakub Niezgoda <jakub.niezgoda@cloudify.co> * Update content/working_with/manager/using-secrets.md Co-authored-by: Jakub Niezgoda <jakub.niezgoda@cloudify.co> * update Secret Page * update link and add plural version --------- Co-authored-by: Jakub Niezgoda <jakub.niezgoda@cloudify.co>
1 parent 9c0d6b0 commit 2aa55bd

8 files changed

Lines changed: 14 additions & 3 deletions

File tree

content/working_with/console/pages/secrets-page.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ draft: false
55
weight: 150
66
---
77

8-
Secret storage provides a tenant-wide variable store for data that you do not want to expose in plain text in the {{< param product_name >}} blueprints, such as login credentials for a platform.
8+
Secret storage provides a tenant-wide variable store for data that you do not want to expose in plain text in the {{< param product_name >}} blueprints, such as login credentials for a platform. Secret Providers management allows you to manage secrets from remote providers, like Vault.
99

1010
![Secrets Page]( /images/ui/pages/secrets-page.png )
1111

12-
See [Secrets widget]({{< relref "working_with/console/widgets/secrets.md" >}}) page for details.
12+
See [Secrets widget]({{< relref "working_with/console/widgets/secrets.md" >}}) and [Secret Providers widget]({{< relref "working_with/console/widgets/secretProviders.md" >}}) for more information.

content/working_with/manager/using-secrets.md

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ Secret `test` created
5050

5151
For more commands, see [secrets command line]({{< relref "cli/orch_cli/secrets.md" >}}).
5252

53-
### Creating a secret from the {{< param cfy_console_name >}}
53+
### Creating local secret from the {{< param cfy_console_name >}}
5454

5555
1. Go to the [Secrets page]({{< relref "working_with/console/pages/secrets-page.md" >}}).
5656
2. Click **Create** in the [Secret Store Management widget]({{< relref "working_with/console/widgets/secrets.md" >}}).
@@ -63,6 +63,17 @@ For more commands, see [secrets command line]({{< relref "cli/orch_cli/secrets.m
6363

6464
![Create Secret]( /images/manager/create_secret_dialog.png )
6565

66+
### Creating remotely provided secret from the {{< param cfy_console_name >}}
67+
1. Go to the [Secrets page]({{< relref "working_with/console/pages/secrets-page.md" >}}).
68+
2. Click **Create** in the [Secret Store Management widget]({{< relref "working_with/console/widgets/secrets.md" >}}).
69+
3. Insert the secret key
70+
4. Click on the checkbox "Retrieve the secret value from a secret provider" (you must have at least one secret provider defined in {{< param product_name >}} to be able to use this option, see [Secret Providers widget]({{< relref "working_with/console/widgets/secretProviders.md" >}}) for details)
71+
5. Select the secret provider from the dropdown list
72+
6. Insert the secret's path in selected secret provider
73+
7. Click **Create**.
74+
75+
![Create Secret]( /images/manager/create_secret_dialog_2.png )
76+
6677
Press on the eye icon for viewing the secret value.
6778

6879
### Updating a secret from the {{< param cfy_console_name >}}
-35.5 KB
Loading
24.4 KB
Loading
-46.6 KB
Loading
70.9 KB
Loading
-31.8 KB
Loading
-26.1 KB
Loading

0 commit comments

Comments
 (0)