Skip to main content
Version: 3.23

Dynamic Provisioning Profiles

senhasegura allows you to create profiles with predefined information to provision service accounts and credentials via API calls.

In this case applications that request the creation of credentials and service accounts will obey the rules that have been determined in the template, such as the given validity (TTL).

Create Dynamic Provisioning Profile

To add a profile, Access the profiles report via the path: Cloud ➔ Cloud IAM ➔ Dynamic Provisioning ➔ Profiles.

  1. In the actions on the page, click on the Add profile option;

  2. On the displayed page, select which account you want to create the profile;

  3. In the form, fill in the Identifier field, which must be unique. The system will not accept an identifier with an existing name;

  4. Check the box of providers you want to create the profile. It is possible to select more than one provider;

  5. For the AWS provider, fill in the following fields:

  6. Select up to 10 policies. AWS itself defines this limit;

  7. Set the default TTL (time to live) to delete service accounts automatically;

  8. For Google Cloud provider, fill in the following fields:

  9. Select in which project the service account should be created;

  10. Select which roles this service account should be assigned at the Organization level;

  11. Select which roles this service account should receive at the Project level;

  12. Set the default TTL (time to live) to delete service accounts automatically;

  13. Finally, click on Confirm to finish;

Enable Dynamic Provisioning Profile

  1. Go to DSM ➔ Applications ➔ Applications

  2. In the report look for the application you want to enable provisioning for and click the corresponding action button and choose the Change option.

  3. On the Automatic provisioning tab, enable automatic provisioning of secrets

  4. In the Cloud dynamic provisioning profile field select the profile that should be used. You can select more than 1 profile.

  5. To finish click on Save.