AWS IAM User Secret
Update
Overview
- Introduction
- Authentication
- Examples
Endpoints
- Identities
- Token Auth
- Universal Auth
- GCP Auth
- AWS Auth
- Azure Auth
- Kubernetes Auth
- OIDC Auth
- JWT Auth
- Groups
- Organizations
- Projects
- Project Users
- Project Groups
- Project Identities
- Project Roles
- Project Templates
- Environments
- Folders
- Secret Tags
- Secrets
- Dynamic Secrets
- Secret Imports
- Secret Rotations
- GETList
- GETOptions
- Auth0 Client Secret
- AWS IAM User Secret
- Azure Client Secret
- LDAP Password
- Microsoft SQL Server Credentials
- PostgreSQL Credentials
- GET
- Identity Specific Privilege
- App Connections
- Secret Syncs
- Integrations
- Service Tokens
- Audit Logs
Infisical PKI
- Certificate Authorities
- Certificates
- Certificate Templates
- Certificate Collections
- PKI Alerting
Infisical SSH
- Hosts
- Host Groups
- Certificates
- Certificate Authorities
- Certificate Templates
Infisical KMS
- Keys
- Encryption
- Signing
AWS IAM User Secret
Update
Update the specified AWS IAM User Secret Rotation.
PATCH
/
api
/
v2
/
secret-rotations
/
aws-iam-user-secret
/
{rotationId}
curl --request PATCH \
--url https://us.infisical.com/api/v2/secret-rotations/aws-iam-user-secret/{rotationId} \
--header 'Content-Type: application/json' \
--data '{
"name": "<string>",
"description": "<string>",
"isAutoRotationEnabled": true,
"rotationInterval": 2,
"rotateAtUtc": {
"hours": 11.5,
"minutes": 29.5
},
"parameters": {
"userName": "<string>",
"region": "us-east-1"
},
"secretsMapping": {
"accessKeyId": "<string>",
"secretAccessKey": "<string>"
}
}'
{
"secretRotation": {
"id": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"name": "<string>",
"description": "<string>",
"secretsMapping": {
"accessKeyId": "<string>",
"secretAccessKey": "<string>"
},
"isAutoRotationEnabled": true,
"activeIndex": 0,
"folderId": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"connectionId": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"createdAt": "2023-11-07T05:31:56Z",
"updatedAt": "2023-11-07T05:31:56Z",
"rotationInterval": 123,
"rotationStatus": "<string>",
"lastRotationAttemptedAt": "2023-11-07T05:31:56Z",
"lastRotatedAt": "2023-11-07T05:31:56Z",
"lastRotationJobId": "<string>",
"nextRotationAt": "2023-11-07T05:31:56Z",
"isLastRotationManual": true,
"connection": {
"app": "aws",
"name": "<string>",
"id": "3c90c3cc-0d44-4b50-8888-8dd25736052a"
},
"environment": {
"slug": "<string>",
"name": "<string>",
"id": "3c90c3cc-0d44-4b50-8888-8dd25736052a"
},
"projectId": "<string>",
"folder": {
"id": "<string>",
"path": "<string>"
},
"rotateAtUtc": {
"hours": 11.5,
"minutes": 29.5
},
"lastRotationMessage": "<string>",
"type": "aws-iam-user-secret",
"parameters": {
"userName": "<string>",
"region": "us-east-1"
}
}
}
Check out the configuration docs for AWS IAM User Secret Rotations to learn how to obtain the required parameters.
Path Parameters
The ID of the AWS IAM User Secret Rotation to be updated.
Body
application/json
The updated name of the AWS IAM User Secret Rotation. Must be slug-friendly.
Required string length:
1 - 32
The updated description of the AWS IAM User Secret Rotation.
Maximum length:
256
Whether secrets should be automatically rotated when the specified rotation interval has elapsed.
The updated interval, in days, to automatically rotate secrets.
Required range:
x >= 1
The name of the client to rotate credentials for.
Minimum length:
1
The AWS region the client is present in.
Available options:
us-east-1
, us-east-2
, us-west-1
, us-west-2
, us-gov-east-1
, us-gov-west-1
, af-south-1
, ap-east-1
, ap-south-1
, ap-south-2
, ap-northeast-1
, ap-northeast-2
, ap-northeast-3
, ap-southeast-1
, ap-southeast-2
, ap-southeast-3
, ap-southeast-4
, ca-central-1
, eu-central-1
, eu-central-2
, eu-west-1
, eu-west-2
, eu-west-3
, eu-south-1
, eu-south-2
, eu-north-1
, me-south-1
, me-central-1
, sa-east-1
Response
200
application/json
Default Response
Available options:
aws-iam-user-secret
The name of the client to rotate credentials for.
Minimum length:
1
The AWS region the client is present in.
Available options:
us-east-1
, us-east-2
, us-west-1
, us-west-2
, us-gov-east-1
, us-gov-west-1
, af-south-1
, ap-east-1
, ap-south-1
, ap-south-2
, ap-northeast-1
, ap-northeast-2
, ap-northeast-3
, ap-southeast-1
, ap-southeast-2
, ap-southeast-3
, ap-southeast-4
, ca-central-1
, eu-central-1
, eu-central-2
, eu-west-1
, eu-west-2
, eu-west-3
, eu-south-1
, eu-south-2
, eu-north-1
, me-south-1
, me-central-1
, sa-east-1
Was this page helpful?
curl --request PATCH \
--url https://us.infisical.com/api/v2/secret-rotations/aws-iam-user-secret/{rotationId} \
--header 'Content-Type: application/json' \
--data '{
"name": "<string>",
"description": "<string>",
"isAutoRotationEnabled": true,
"rotationInterval": 2,
"rotateAtUtc": {
"hours": 11.5,
"minutes": 29.5
},
"parameters": {
"userName": "<string>",
"region": "us-east-1"
},
"secretsMapping": {
"accessKeyId": "<string>",
"secretAccessKey": "<string>"
}
}'
{
"secretRotation": {
"id": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"name": "<string>",
"description": "<string>",
"secretsMapping": {
"accessKeyId": "<string>",
"secretAccessKey": "<string>"
},
"isAutoRotationEnabled": true,
"activeIndex": 0,
"folderId": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"connectionId": "3c90c3cc-0d44-4b50-8888-8dd25736052a",
"createdAt": "2023-11-07T05:31:56Z",
"updatedAt": "2023-11-07T05:31:56Z",
"rotationInterval": 123,
"rotationStatus": "<string>",
"lastRotationAttemptedAt": "2023-11-07T05:31:56Z",
"lastRotatedAt": "2023-11-07T05:31:56Z",
"lastRotationJobId": "<string>",
"nextRotationAt": "2023-11-07T05:31:56Z",
"isLastRotationManual": true,
"connection": {
"app": "aws",
"name": "<string>",
"id": "3c90c3cc-0d44-4b50-8888-8dd25736052a"
},
"environment": {
"slug": "<string>",
"name": "<string>",
"id": "3c90c3cc-0d44-4b50-8888-8dd25736052a"
},
"projectId": "<string>",
"folder": {
"id": "<string>",
"path": "<string>"
},
"rotateAtUtc": {
"hours": 11.5,
"minutes": 29.5
},
"lastRotationMessage": "<string>",
"type": "aws-iam-user-secret",
"parameters": {
"userName": "<string>",
"region": "us-east-1"
}
}
}