Overview
- Introduction
- Authentication
- Examples
Endpoints
- Identities
- Token Auth
- Universal Auth
- GCP Auth
- AWS Auth
- Azure Auth
- Kubernetes Auth
- OIDC Auth
- JWT Auth
- Groups
- Organizations
- Projects
- Project Users
- Project Groups
- Project Identities
- Project Roles
- Project Templates
- Environments
- Folders
- Secret Tags
- Secrets
- Dynamic Secrets
- Secret Imports
- Secret Rotations
- GETList
- GETOptions
- Auth0 Client Secret
- AWS IAM User Secret
- Azure Client Secret
- LDAP Password
- Microsoft SQL Server Credentials
- PostgreSQL Credentials
- GET
- Identity Specific Privilege
- App Connections
- Secret Syncs
- Integrations
- Service Tokens
- Audit Logs
Infisical PKI
- Certificate Authorities
- Certificates
- Certificate Templates
- Certificate Collections
- PKI Alerting
Infisical SSH
- Hosts
- Host Groups
- Certificates
- Certificate Authorities
- Certificate Templates
Infisical KMS
- Keys
- Encryption
- Signing
Create
Create an AWS IAM User Secret Rotation for the specified project.
curl --request POST \
--url https://us.infisical.com/api/v2/secret-rotations/aws-iam-user-secret \
--header 'Content-Type: application/json' \
--data '{
"name": "<string>",
"projectId": "<string>",
"description": "<string>",
"connectionId": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"environment": "<string>",
"secretPath": "<string>",
"isAutoRotationEnabled": true,
"rotationInterval": 2,
"rotateAtUtc": {
"hours": 11.5,
"minutes": 29.5
},
"parameters": {
"userName": "<string>",
"region": "us-east-1"
},
"secretsMapping": {
"accessKeyId": "<string>",
"secretAccessKey": "<string>"
}
}'
{
"secretRotation": {
"id": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"name": "<string>",
"description": "<string>",
"secretsMapping": {
"accessKeyId": "<string>",
"secretAccessKey": "<string>"
},
"isAutoRotationEnabled": true,
"activeIndex": 0,
"folderId": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"connectionId": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"createdAt": "2023-11-07T05:31:56Z",
"updatedAt": "2023-11-07T05:31:56Z",
"rotationInterval": 123,
"rotationStatus": "<string>",
"lastRotationAttemptedAt": "2023-11-07T05:31:56Z",
"lastRotatedAt": "2023-11-07T05:31:56Z",
"lastRotationJobId": "<string>",
"nextRotationAt": "2023-11-07T05:31:56Z",
"isLastRotationManual": true,
"connection": {
"app": "aws",
"name": "<string>",
"id": "3c90c3cc-0d44-4b50-8888-8dd25736052a"
},
"environment": {
"slug": "<string>",
"name": "<string>",
"id": "3c90c3cc-0d44-4b50-8888-8dd25736052a"
},
"projectId": "<string>",
"folder": {
"id": "<string>",
"path": "<string>"
},
"rotateAtUtc": {
"hours": 11.5,
"minutes": 29.5
},
"lastRotationMessage": "<string>",
"type": "aws-iam-user-secret",
"parameters": {
"userName": "<string>",
"region": "us-east-1"
}
}
}
Check out the configuration docs for AWS IAM User Secret Rotations to learn how to obtain the required parameters.
Body
The name of the AWS IAM User Secret Rotation to create. Must be slug-friendly.
1 - 32
The ID of the project to create the rotation in.
1
The ID of the AWS Connection to use for rotation.
The slug of the project environment to create the rotation in.
1 - 64
The secret path of the project to create the rotation in.
1
The interval, in days, to automatically rotate secrets.
x >= 1
The name of the client to rotate credentials for.
1
The AWS region the client is present in.
us-east-1
, us-east-2
, us-west-1
, us-west-2
, us-gov-east-1
, us-gov-west-1
, af-south-1
, ap-east-1
, ap-south-1
, ap-south-2
, ap-northeast-1
, ap-northeast-2
, ap-northeast-3
, ap-southeast-1
, ap-southeast-2
, ap-southeast-3
, ap-southeast-4
, ca-central-1
, eu-central-1
, eu-central-2
, eu-west-1
, eu-west-2
, eu-west-3
, eu-south-1
, eu-south-2
, eu-north-1
, me-south-1
, me-central-1
, sa-east-1
An optional description for the AWS IAM User Secret Rotation.
256
Whether secrets should be automatically rotated when the specified rotation interval has elapsed.
Response
aws-iam-user-secret
The name of the client to rotate credentials for.
1
The AWS region the client is present in.
us-east-1
, us-east-2
, us-west-1
, us-west-2
, us-gov-east-1
, us-gov-west-1
, af-south-1
, ap-east-1
, ap-south-1
, ap-south-2
, ap-northeast-1
, ap-northeast-2
, ap-northeast-3
, ap-southeast-1
, ap-southeast-2
, ap-southeast-3
, ap-southeast-4
, ca-central-1
, eu-central-1
, eu-central-2
, eu-west-1
, eu-west-2
, eu-west-3
, eu-south-1
, eu-south-2
, eu-north-1
, me-south-1
, me-central-1
, sa-east-1
Was this page helpful?
curl --request POST \
--url https://us.infisical.com/api/v2/secret-rotations/aws-iam-user-secret \
--header 'Content-Type: application/json' \
--data '{
"name": "<string>",
"projectId": "<string>",
"description": "<string>",
"connectionId": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"environment": "<string>",
"secretPath": "<string>",
"isAutoRotationEnabled": true,
"rotationInterval": 2,
"rotateAtUtc": {
"hours": 11.5,
"minutes": 29.5
},
"parameters": {
"userName": "<string>",
"region": "us-east-1"
},
"secretsMapping": {
"accessKeyId": "<string>",
"secretAccessKey": "<string>"
}
}'
{
"secretRotation": {
"id": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"name": "<string>",
"description": "<string>",
"secretsMapping": {
"accessKeyId": "<string>",
"secretAccessKey": "<string>"
},
"isAutoRotationEnabled": true,
"activeIndex": 0,
"folderId": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"connectionId": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"createdAt": "2023-11-07T05:31:56Z",
"updatedAt": "2023-11-07T05:31:56Z",
"rotationInterval": 123,
"rotationStatus": "<string>",
"lastRotationAttemptedAt": "2023-11-07T05:31:56Z",
"lastRotatedAt": "2023-11-07T05:31:56Z",
"lastRotationJobId": "<string>",
"nextRotationAt": "2023-11-07T05:31:56Z",
"isLastRotationManual": true,
"connection": {
"app": "aws",
"name": "<string>",
"id": "3c90c3cc-0d44-4b50-8888-8dd25736052a"
},
"environment": {
"slug": "<string>",
"name": "<string>",
"id": "3c90c3cc-0d44-4b50-8888-8dd25736052a"
},
"projectId": "<string>",
"folder": {
"id": "<string>",
"path": "<string>"
},
"rotateAtUtc": {
"hours": 11.5,
"minutes": 29.5
},
"lastRotationMessage": "<string>",
"type": "aws-iam-user-secret",
"parameters": {
"userName": "<string>",
"region": "us-east-1"
}
}
}