Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enhancement: Add Support for Native Secrets Management services from AWS, Azure, and Google Cloud #4545

Open
1 task done
ldavis9000aws opened this issue Oct 24, 2024 · 0 comments · May be fixed by #5625
Open
1 task done
Labels
✨ enhancement New feature or request

Comments

@ldavis9000aws
Copy link

What features would you like to see added?

I would ike to see support for AWS Secrets Manager, Azure Key Vault, and Google Cloud Secret Manager. Using the .env files or environment variables is convienient, but from a security perspective I'd like to see support for the native secrets manager solutions from all 3 major cloud providers.

More details

Give users the ability to use AWS Secrets Manager, Azure Key Vault, and Google Cloud Secret Manager. Cache those credentials for a period of time determined in LibreChat by an admin before they are automatically refreshed.

Which components are impacted by your request?

General, Endpoints

Pictures

No response

Code of Conduct

  • I agree to follow this project's Code of Conduct
@ldavis9000aws ldavis9000aws added the ✨ enhancement New feature or request label Oct 24, 2024
@ldavis9000aws ldavis9000aws changed the title Enhancement: Add Support for Secrets Management from the 3 Major Cloud Providers Enhancement: Add Support for Native Secrets Management services from AWS, Azure, and Google Cloud Oct 24, 2024
@rubentalstra rubentalstra self-assigned this Feb 3, 2025
@rubentalstra rubentalstra removed their assignment Feb 14, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
✨ enhancement New feature or request
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants