Troubleshooting
Solutions to common Secrets Manager issues
Access Denied
When attempting a Secrets Manager command in Commander, the tool responds with access_denied
Solution
In order to utilize Keeper Secrets Manager, two permission criteria must be met:
The Secrets Manager add on must be enabled for your Keeper Account, and you must have an active (non-expired) subscription.
You must be in a role with the Secrets Manager enforcement policy enabled
Enabling the Secrets Manager Add On
Secrets Manager can be added from the "Secure Add Ons" section of the Keeper Admin Console.
Enabling the Secrets Manager Enforcement Policy
In the Keeper Admin Console add Secrets Manager to a role with role enforcements. Select or create a new role, open the "Enforcement Policies" settings and navigate to the "Keeper Secrets Manager" tab to allow or disallow Secrets Manager for the role.
Any users that are in a role with Secrets Manager allowed will be able to see the Secrets Manager tab in their Keeper Vault, and create and manage Secrets Manager Applications and Devices.
Record UID Starts With "-"
When performing commands with the KSM CLI that use a record or folder UID as an input, the command line interface cannot distinguish between a UID that starts with "-" and a command option. If the UID you are using begins with a "-" (dash / hyphen) simply add "--" before the UID to use it.
Example:
ksm secret get -- -id8QpE2ZAkdd4KlCfoWQ
*The UID in this example is not a real record UID
Record not Found
When fetching secrets using Secrets Manager, the system responds that the record could not be found.
Solution
There are two reasons that this message may appear:
The record that is being searched for is not shared with the Secrets Manager Application
The record is a legacy (V2) non-typed record
Share Records with Secrets Manager
Individual records can be shared with a Secrets Manager Application, or a shared folder can be shared with a Secrets Manager Application, which will give access to all records in that folder.
To share records or shared folders with a Secrets Manager Application, in Commander use the following command:
Identify Typed Records
Keeper Secrets Manager supports typed records (V3) only. If a legacy, non-typed record is queried, Secrets Manager will respond that the record cannot be found.
To identify if a record is typed in Commander, use the get
command
If the record has a type (and is compatible with Secrets Manager) it will be displayed in the record information
If the record is not typed (and not compatible with Secrets Manager) it will not have a Type field.
Additionally, you can view all records in the current folder using the ls -l
command. The resulting table has a type column. Any records which are blank in the type column are non typed records.
In the above example, the bottom record (#4) is not typed, and not compatible with Secrets Manager
Create Typed Records
Typed records can be created in by clicking "Create New" in the vault, or using the add command in Commander.
When choosing a record type, all types are compatible with Secrets Manager except for the "General" type.
General type records are identical to legacy, non typed records.
Replace an existing record
If you have existing non typed records that you would like to use with Secrets Manager, we recommend creating a "Login" type record and copying the information to it.
Login type records have identical fields to legacy non typed Keeper records.
Place the new typed record in a shared folder that your Secrets Manager application can access, or use the UID to share it to an application directly.
Convert Untyped Records
Untyped records can be converted to typed records that Secrets Manager can utilize by using the convert
command in Keeper Commander.
Format:
convert <UID> --type <TYPE>
Example:
The convert command can use patterns to find all relevant records, can recursively apply the conversion to all sub-folders, and supports all record types.
For more information on using the convert
command, see the Commander documentation.
Throttling
The Keeper Secrets Manager API throttles connections that make a large number of requests in a short period of time. If your connection is throttled, you will receive an error, such as a 503 response code (the actual message depends on the integration/SDK being used).
Details of the rate limits:
The Secrets Manager APIs are set to limit any system that makes more than 200 calls per 10 seconds.
This count resets when the 10 second timer expires, however it renews with each subsequent request sent in less than 10 seconds. So without a 10 second pause, the system will continue to be throttled.
Examples of when you may be throttled:
Making 201 calls in less than 10 seconds
Making 1 call per 9 seconds, you will be throttled on your 201'st call
API request limits are calculated by unique IP address
Last updated