SaaS Configuration
Automatically rotates credentials for supported cloud-based services.

Overview
SaaS Configuration enables users to automate password rotations for cloud-based services. By rotating passwords and secrets on a defined schedule (or on-demand), you can strengthen security, reduce risk from credential exposure, and support compliance requirements.
With SaaS Configurations, you can:
Automatically rotate passwords/secrets for built-in services
Build your own SaaS rotation plugins
Use one of the community plugins (catalog)
Define rotation frequency and criteria
Trigger rotation manually when needed
Supported Services
This system supports password rotation for various SaaS platforms, including:
AWS Access Key (Built-in)
AWS Cognito (Catalog)
Azure Client Secret (Built-in)
Cisco APIC (Catalog)
Cisco IOS XE (Built-in)
Cisco Meraki (Built-in)
Dummy (Catalog)
Elasticsearch API Key (Catalog)
Elasticsearch Service Account Token (Catalog)
Elasticsearch User (Catalog)
JFrog Access Token (Catalog)
JFrog User Password Rotation (Catalog)
Okta (Built-in)
OpenSearch User (Catalog)
Oracle Identity Domain User (Catalog)
REST (Built-in)
ServiceNow User (Catalog)
Snowflake (Built-in)
Splunk Token Rotation (Catalog)
Splunk User Password Rotation (Catalog)
Each service has specific setup requirements (such as API permissions, tokens, or secret formats). Ensure your service account is configured correctly before enabling rotation.
Requirements
To use SaaS Configuration Password Rotation, the following requirements must be met:
Gateway Requirements
PAM Gateway version 1.6 or newer
The Gateway must be online to select it during setup
Vault version 17.6 (Go-live: Feb 2026)
Folder Requirements
The SaaS Configuration record must be stored in the Shared Folder(s) assigned to the selected Gateway (This ensures the Gateway can access and rotate the credential.)
How It Works
SaaS Configuration uses your selected PAM Gateway to securely connect to the target service and update the password/secret. When rotation completes, Keeper updates the stored credential to keep your Vault up to date.
Rotation can be triggered by:
Time-based rotation (scheduled)
Manual rotation (run on demand)
Create & Configure SaaS Configuration
This guide walks you through creating a SaaS Configuration record and applying it to a PAM User for automated password rotation.
Step 1: Create a SaaS Configuration Record
In Keeper, click Create New
Select SaaS Configuration
Select an active Gateway
Only online Gateways are available to select.
Select a Plugin
The available plugins shown are based on the Gateway you selected.
If you don’t see the plugin you need, you may need to create or enable the plugin first.
Choose where to save the record
You must save the SaaS Configuration record in a Shared Folder associated with the selected Gateway.
Click Save
Step 2: Assign the SaaS Configuration to a PAM User
Open the target PAM User record → Edit
Navigate to Rotation Settings
Under Rotation Settings, select the SaaS Configuration record you created in Step 1
Within the Rotation Settings, you can schedule password rotations.
Click Save
Once assigned, Keeper will use that SaaS Configuration whenever the user’s password rotation is executed.
These actions can be managed through Keeper Commander.
If you prefer using a command-line interface, refer to the Keeper Commander – SaaS Rotations documentation.
Last updated
Was this helpful?

