Skip to main content

Configure workflow execution

When using Self-deployed Runtime for extraction, source system credentials (secrets) required for workflow execution are retrieved from your configured secret store. This guide provides steps to configure workflows with Self-deployed Runtime and specify the secret details it uses during workflow execution.

Before you begin

Before configuring Self-deployed Runtime for workflow execution, make sure you have:

  • A deployed and active Self-deployed Runtime instance (see Install on Docker Compose or Install on Kubernetes)
  • Access to one of the supported secret stores: AWS Secrets Manager, Azure Key Vault, GCP Secret Manager, HashiCorp Vault, Kubernetes Secrets, or environment variables
Did you know?

Your secret store was configured during Self-deployed Runtime deployment. The configuration specified in your deployment determines how secrets are retrieved during workflow execution.

Configure secrets retrieval for workflow execution

Follow these steps to configure Self-deployed Runtime to retrieve secrets from your secret store required for workflow execution. This configuration happens in the Atlan UI when you set up or edit connector workflows.

💪 Did you know?

For each field, you can enter either the name of a secret stored in your secret manager or the actual value. Use secret names when using a secret store with Self-deployed Runtime, or enter values directly if no secret is required.

Self-deployed Runtime retrieves the required secrets from AWS Secrets Manager during workflow execution. Follow these steps to configure retrieval under the Self-deployed Runtime configuration section:

  • Secret path in Secret Manager: Provide the Amazon Resource Name (ARN) or the path of the secret that contains the sensitive configuration details required for the connector. These details may include credentials such as username, password, or other sensitive information needed by the Self-deployed Runtime to securely access data during workflow execution.
  • AWS region: Select the region where your AWS Secrets Manager is located.
  • AWS authentication method: Select how you want the Self-deployed Runtime to authenticate when executing the workflow. Choose one:
    • IAM (Recommended): Use this method if the Self-deployed Runtime was configured to use the AWS IAM permissions to access secrets.
    • IAM Assume Role: Use this method if the runtime was configured to access secrets via cross-account roles.
    • AWS Assume Role ARN: Provide the IAM Role ARN that grants the Self-deployed Runtime permission to retrieve secrets.
    • Access Key & Secret Key: Use this method if the runtime was configured to use the AWS Access Key ID and Secret Access Key via environment variables or Kubernetes secrets.

For more information on configuring AWS Secrets Manager during deployment, see the secret storage configuration section in Install on Docker Compose or Install on Kubernetes.

Additional secret stores

Dapr supports additional secret stores beyond those listed here. For information on other supported secret stores, see the Dapr secret store documentation.


Next steps

After configuring the Self-deployed Runtime for workflow execution, return to your connector's setup guide and continue the workflow setup.