Secrets
Generate Environment Variables to save your confidential information from getting exposed.
Last updated
Generate Environment Variables to save your confidential information from getting exposed.
Last updated
You can generate Environment variables for the confidential information of your database using the Secret Management function. Thus, it saves your secret information from getting exposed to all the accessible users.
Pre-requisite: It is mandatory for the users to configure the Secret Management using the Admin module of the platform before attempting the Secret option inside the DS Lab module.
Check out this walk-through video on how to use Secret Management function in regards to Notebook.
Navigate to the Admin Module using the Apps menu.
Click the Secret Management option from the Admin panel.
The Secret Management page opens.
Click the New option to create a new Secret Key using the Secret Management page.
It redirects to add a new Secret Key option.
Name the new Secret Key.
Click the Save option.
The newly created Secret Key gets saved.
A confirmation message appears to inform the completion of the action.
Navigate to the Secret Management page.
Select a Secret Key.
Click the Add icon to add a new field below.
The added fields appear below.
Select a Secret Key from the Secret Management page.
Click the Share icon.
The Share Secret Key dialog box opens.
Select any one tab out of USER, USERGROUP, and EXCLUDE USER.
Search for a user using the Search space.
Use arrow mark to move the user/user groups from the left side box to the box given on the right. It will appear as shown in the below given image.
Click the Save option.
A confirmation message appears to inform about the completion of the share action.
Navigate to a Notebook.
Open the Secrets tab from the right-side.
The newly created Secret Key gets listed below.
Click the drop-down icon next to the Secret Key name.
The details of the selected Secret Key gets opened.
Add a new Code cell.
Select the Secret Key by using the given check boxes.
The selected details get entered in the code cell.
Please Note: The following image indicates how we can verify whether the database is connected successfully or not by using the encrypted credentials.