mirror of
https://github.com/n8n-io/n8n-docs.git
synced 2026-03-27 09:28:43 +07:00
clear out old link syntax (#3402)
Co-authored-by: Justin Ellingwood <justin@n8n.io>
This commit is contained in:
@@ -10,7 +10,7 @@ contentType: howto
|
||||
/// info | Feature availability
|
||||
* External secrets are available on Enterprise Self-hosted and Enterprise Cloud plans.
|
||||
* n8n supports AWS Secrets Manager, Azure Key Vault, GCP Secrets Manager, Infisical and HashiCorp Vault.
|
||||
* n8n doesn't support [HashiCorp Vault Secrets](https://developer.hashicorp.com/hcp/docs/vault-secrets){:target=_blank .external-link}.
|
||||
* n8n doesn't support [HashiCorp Vault Secrets](https://developer.hashicorp.com/hcp/docs/vault-secrets).
|
||||
///
|
||||
|
||||
You can use an external secrets store to manage [credentials](/glossary.md#credential-n8n) for n8n.
|
||||
@@ -26,7 +26,7 @@ Your secret names can't contain spaces, hyphens, or other special characters. n8
|
||||
1. In n8n, go to **Settings** > **External Secrets**.
|
||||
1. Select **Set Up** for your store provider.
|
||||
1. Enter the credentials for your provider:
|
||||
* Azure Key Vault: Provide your **vault name**, **tenant ID**, **client ID**, and **client secret**. Refer to the Azure documentation to [register a Microsoft Entra ID app and create a service principal](https://learn.microsoft.com/en-us/entra/identity-platform/howto-create-service-principal-portal){:target=_blank .external-link}. n8n supports only single-line values for secrets.
|
||||
* Azure Key Vault: Provide your **vault name**, **tenant ID**, **client ID**, and **client secret**. Refer to the Azure documentation to [register a Microsoft Entra ID app and create a service principal](https://learn.microsoft.com/en-us/entra/identity-platform/howto-create-service-principal-portal). n8n supports only single-line values for secrets.
|
||||
* AWS Secrets Manager: provide your **access key ID**, **secret access key**, and **region**. The IAM user must have the `secretsmanager:ListSecrets`, `secretsmanager:BatchGetSecretValue`, and `secretsmanager:GetSecretValue` permissions.
|
||||
|
||||
To give n8n access to all secrets in your AWS Secrets Manager, you can attach the following policy to the IAM user:
|
||||
@@ -85,26 +85,26 @@ Your secret names can't contain spaces, hyphens, or other special characters. n8
|
||||
}
|
||||
```
|
||||
|
||||
For more IAM permission policy examples, consult the [AWS documentation](https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access_iam-policies.html#auth-and-access_examples_batch){:target=_blank .external-link}.
|
||||
For more IAM permission policy examples, consult the [AWS documentation](https://docs.aws.amazon.com/secretsmanager/latest/userguide/auth-and-access_iam-policies.html#auth-and-access_examples_batch).
|
||||
|
||||
* HashiCorp Vault: provide the **Vault URL** for your vault instance, and select your **Authentication Method**. Enter your authentication details. Optionally provide a namespace.
|
||||
- Refer to the HashiCorp documentation for your authentication method:
|
||||
[Token auth method](https://developer.hashicorp.com/vault/docs/auth/token){:target=_blank .external-link}
|
||||
[AppRole auth method](https://developer.hashicorp.com/vault/docs/auth/approle){:target=_blank .external-link}
|
||||
[Userpass auth method](https://developer.hashicorp.com/vault/docs/auth/userpass){:target=_blank .external-link}
|
||||
- If you use vault namespaces, you can enter the namespace n8n should connect to. Refer to [Vault Enterprise namespaces](https://developer.hashicorp.com/vault/docs/enterprise/namespaces){:target=_blank .external-link} for more information on HashiCorp Vault namespaces.
|
||||
[Token auth method](https://developer.hashicorp.com/vault/docs/auth/token)
|
||||
[AppRole auth method](https://developer.hashicorp.com/vault/docs/auth/approle)
|
||||
[Userpass auth method](https://developer.hashicorp.com/vault/docs/auth/userpass)
|
||||
- If you use vault namespaces, you can enter the namespace n8n should connect to. Refer to [Vault Enterprise namespaces](https://developer.hashicorp.com/vault/docs/enterprise/namespaces) for more information on HashiCorp Vault namespaces.
|
||||
|
||||
* Infisical: provide a **Service Token**. Refer to Infisical's [Service token](https://infisical.com/docs/documentation/platform/token){:target=_blank .external-link} documentation for information on getting your token. If you self-host Infisical, enter the **Site URL**.
|
||||
* Infisical: provide a **Service Token**. Refer to Infisical's [Service token](https://infisical.com/docs/documentation/platform/token) documentation for information on getting your token. If you self-host Infisical, enter the **Site URL**.
|
||||
|
||||
/// note | Infisical environment
|
||||
Make sure you select the correct Infisical environment when creating your token. n8n will load secrets from this environment, and won't have access to secrets in other Infisical environments. n8n only support service tokens that have access to a single environment.
|
||||
///
|
||||
|
||||
/// note | Infisical folders
|
||||
n8n doesn't support [Infisical folders](https://infisical.com/docs/documentation/platform/folder){:target=_blank .external-link}.
|
||||
n8n doesn't support [Infisical folders](https://infisical.com/docs/documentation/platform/folder).
|
||||
///
|
||||
|
||||
* Google Cloud Platform: provide a **Service Account Key** (JSON) for a service account that has at least these roles: `Secret Manager Secret Accessor` and `Secret Manager Secret Viewer`. Refer to Google's [service account documentation](https://cloud.google.com/iam/docs/service-account-overview){:target=_blank .external-link} for more information.
|
||||
* Google Cloud Platform: provide a **Service Account Key** (JSON) for a service account that has at least these roles: `Secret Manager Secret Accessor` and `Secret Manager Secret Viewer`. Refer to Google's [service account documentation](https://cloud.google.com/iam/docs/service-account-overview) for more information.
|
||||
|
||||
1. **Save** your configuration.
|
||||
1. Enable the provider using the **Disabled / Enabled** toggle.
|
||||
|
||||
Reference in New Issue
Block a user