Use AWS Secrets Manager to store sensitive data like passwords and API keys. Values are retrieved at runtime without exposing secrets in your workflow.Documentation Index
Fetch the complete documentation index at: https://docs.optexity.com/llms.txt
Use this file to discover all available pages before exploring further.
Setup
Create a Secret in AWS
- Go to the AWS Secrets Manager console
- Click Store a new secret
- Choose Other type of secret (key/value pairs or plain text)
- Name your secret (e.g.
my-app/prod/login) - Note the secret name and the AWS region it was created in
Create IAM Credentials
- Go to the IAM console
- Create a user or role with the following policy:
- Generate an access key and copy the credentials
Configure Environment
Add them directly on the Integrations page of the dashboard, or add to your.env file:
Usage
Move parameters frominput_parameters to secure_parameters:
Before:
{"username": "admin", "password": "s3cr3t"}, use the key field to pluck the value you need:
Properties
| Property | Type | Default | Description |
|---|---|---|---|
secret_name | str | Required | Name or ARN of the secret in AWS Secrets Manager |
region_name | str | Required | AWS region where the secret is stored (e.g. "us-east-1") |
key | str | null | Key to extract from the secret (plain string or JSON object) |
type | str | null | Set to "totp_secret" to generate TOTP codes |
digits | int | null | Required when type is "totp_secret" (e.g. 6) |
TOTP from AWS Secrets Manager
Store a TOTP secret in AWS Secrets Manager and generate codes at runtime:key with type: "totp_secret":