IBM Cloud Global

Cloud Global

Our mission is to provide clients with an online user community of industry peers and IBM experts, to exchange tips and tricks, best practices, and product knowledge. We hope the information you find here helps you maximize the value of your IBM Cloud solutions.

 View Only

Unlock new possibilities with custom credentials in IBM Cloud Secrets Manager

By Damneet Basak posted Fri June 06, 2025 04:36 PM

  

IBM Cloud Secrets Manager, powered by HashiCorp Vault, is the only centralized secrets and certificate management solution purpose built for IBM Cloud environments. Designed with security and scalability in mind, it offers single tenant data-plane isolation, event-driven notifications, automatic secret rotation, and context-based access restrictions—all to help you safeguard sensitive data with confidence.

 

Whether you're managing API tokens, database credentials, TLS certificates, or cloud access keys, Secrets Manager provides a flexible and resilient platform to handle secrets across your IBM Cloud infrastructure. 

Added to these established functionalities is a new feature known as custom credentials, a powerful new secret type that lets you integrate with virtually any credentials provider.Custom credentials gives you full control over how you define, store, and manage secrets in your environment

🔓 What Are Custom Credentials?

Custom credentials allow you to define how Secrets Manager retrieves and manages secrets from external providers.

At the heart of this capability is an  IBM Cloud Code Engine job— a lightweight, containerized bridge between Secrets Manager and your credentials provider, allowing you to:  

  • Connect to any provider that exposes an API or secret
  • Implement custom logic for secret retrieval
  • Enable automatic or manual rotation
  • Leverage built-in features like versioning, expiration, notifications, and audit logging

🔄 Real world use cases

Here are just a few ways custom credentials can be supported and used:

Description

Example Provider or Tool

Securely rotate and manage tokens used in CI/CD pipelines

Jenkins API tokens, GitHub/GitLab tokens, Terraform Cloud API keys

Automatically rotate database passwords used by applications

PostgreSQL/MySQL credentials, MongoDB Atlas API keys, Data warehouse credentials

Manage access to cloud services dynamically

IBM Cloud API keys, AWS/GCP/Azure credentials, Slack tokens

Generate short-lived secrets for test environments

Ephemeral credentials, Mock API keys

Rotate tokens used to pull/push artifacts in CI/CD

Artifactory access tokens, PagerDuty API tokens, Sentry or Datadog API keys

Interface with legacy systems that expose secrets via custom APIs

Internal credential brokers, On-prem services

🛠 Get Started with our GitHub toolkit

To make building your own credential providers easier, we’ve launched a developer-focused GitHub repository that includes: :

  • ✅ Ready-to-use templates and tools
  • 🔄 Reusable provider implementations
  • 🤝 A space to contribute and collaborate

We're starting with support for Artifactory and PostgreSQL and actively inviting the community to help expand support for additional providers.

👉 Explore the GitHub repo

🌟 Ready to Build?

Custom credentials can help you scale your secret management securely and flexibly. Whether you're modernizing legacy systems, building cloud-native apps, securing access to internal tools, or integrating with third-party services, this new feature gives you the control you need. 

To ensure you can get started with custom credentials quickly, check that your automation tools are up to date: 

  • IBM Secrets Manager CLI
  • SDKs
  • Terraform provider

📘 Refer to the full documentation for a step-by-step guide to implementing your first custom credentials engine.

Frequently Asked Questions

What is a custom credentials engine configuration? 
A customizable set of parameters that define how a secret interacts with a credentials provider—powered by a Code Engine job. 

 

What is a Code Engine job in this context? 
It’s the logic layer that connects Secrets Manager to your credentials provider, using the Secrets Manager API to fetch and manage secrets dynamically. 

 

What types of credential providers can I use? 
Anything with an API or secret interface—databases, cloud services, internal tools, and more. 

  • jFrog Artifactory access tokens  
  • Database credentials  
  • IBM Cloud API keys  
  • Slack tokens  
  • Jenkins API tokens 
  • PagerDuty API tokens  
  • … and many more! 

 

Learn More about IBM Cloud Secrets Manager here 

Learn More about IBM Cloud Code Engine here 

0 comments
8 views

Permalink