Global Credential Management
Last updated
Last updated
There are several third-party sites and applications that can interact with Release Owl, like artefact repositories, cloud-based storage systems, services etc. The admin can configure credentials in the application for use by Release Owl. Once the user adds/configures the credentials in Release Owl, the credentials can be used by Pipeline projects to interact with the 3rd party applications.
Accessing the Credential Manager:
Admin users can switch to the Administration View to access the Credential Manager.
Click the Credential Manager menu option on the left-hand pane to view the list of registered credentials.
Registering a New Credential:
To add a new credential, click Register Credential, available on the right-hand panel.
The following screen will be displayed:
ReleaseOwl supports various credential types for registration. Below, we will explore each type in detail.
Click on the "Register Credential" button.
Fill in the required fields:
Credential Name: Enter a name of your choice.
Credential Type: Select Version Control.
Username: Enter your GitHub/Bitbucket username.
Password: Enter your GitHub/Bitbucket password.
Save the configuration to enable access to your GitHub/Bitbucket account.
Click on the "Register Credential" button.
Fill in the required fields:
Credential Name: Enter a name of your choice.
Credential Type: Select Azure DevOps.
Username: Enter your Azure DevOps username.
Token: Provide your Azure DevOps personal access token (PAT).
Host URL: Enter the Azure DevOps organization URL (e.g., https://dev.azure.com/)
.
Save the configuration to enable access to your Azure DevOps account.
Click on the "Register Credential" button.
Fill in the required fields:
Credential Name: Enter a name of your choice.
Credential Type: Select SAP Cloud Environment.
Authentication Type: Choose either Basic or OAuth2.
If Basic is selected:
Provide your Username and Password (SAP BTP credentials).
If OAuth2 is selected:
Client ID: Provide the details from the created API service key in the SAP BTP cockpit.
Client Secret: Provide the details from the created API service key in the SAP BTP cockpit.
Token URL: Provide the details from the created API service key in the SAP BTP cockpit.
Click save.
The credential will appear in the List of Credentials.
Click on the "Register Credential" button.
Fill in the required fields:
Credential Name: Enter a name of your choice.
Credential Type: Select SAP HANA XSA Environment.
Username: Enter your SAP BTP username.
Password: Enter your SAP BTP password.
Click Save.
The credential will appear in the List of Credentials.
Click on the "Register Credential" button.
Fill in the required fields:
Credential Name: Enter a name of your choice.
Credential Type: Select Static Code Analysis -SonarQube .
Username: Enter your SonarQube username.
Token: Provide your SonarQube authentication token.
Host URL: Enter the URL of your SonarQube instance (either On-Premise or Cloud).
Hosting Type: Choose either On-Premise or Cloud, depending on your SonarQube setup.
Save the changes to configure and enable access to your SonarQube On-Prem account.
Click on the "Register Credential" button.
Fill in the required fields:
Credential Type: Select Transport Manager Credential from the dropdown.
Credential Name: Provide any name of your choice (e.g., "Transport Manager Access").
Username: Enter your username for the Transport Domain Controller system.
Password: Provide the password associated with your username.
Click Save to finalize the setup and enable access to your Transport Domain Controller system.
Click on the "Register Credential" button.
Fill in the required fields:
Credential Name: Enter a name of your choice (e.g., "Jira Access").
Credential Type: Select Jira from the dropdown.
Authentication Type: Choose either Basic or OAuth2.
If Basic is selected:
Username: Provide the username associated with the credential (e.g., Jira account username).
Password/API Token: Enter the password or API token for authentication with the chosen system.
Jira URL: Provide the Jira instance URL, such as: https://Saparate.atlassian.net
.
Proxy Type: Select the proxy type for communication (e.g., Direct, Proxy).
If OAuth2 is selected:
Client ID: Provide the client ID from your Jira OAuth2 application.
Client Secret: Enter the client secret associated with your Jira OAuth2 application.
Jira URL: Provide the Jira instance URL, such as: https://Saparate.atlassian.net
.
Proxy Type: Select the proxy type for communication (e.g., Direct, Proxy).
Click Save to finalize the setup.
Click on the "Register Credential" button.
Fill in the following fields:
Credential Name: Enter a name for your reference in ReleaseOwl.
Credential Type: Select ServiceNow.
Authentication Type: Choose either:
OAuth2: For token-based authentication.
Basic Authentication: For username and password-based access.
Instance URL: Enter your ServiceNow hosting URL.
Log in to your ServiceNow account.
Navigate to ALL and search for Application Registry.
Click on Application Registry.
Locate and click on ReleaseOwl in the list of OAuth Registries.
View the Client ID and Client Secret associated with ReleaseOwl.
Copy the Client ID and Client Secret and paste them into the corresponding fields in the Register Credential form in ReleaseOwl under OAuth2 Authentication.
Click the Save button.
Click Generate Token.
A popup will appear prompting you to enter your ServiceNow username and password.
Enter your credentials and click the Generate button.
The generated token will be available in the Manage Tokens section under ALL in the ServiceNow website.
Log in to your ServiceNow instance.
Click the Request Instance button.
You will receive an email containing the instance details.
In the email, locate the section containing your username and password details.
Copy these credentials and paste them into the corresponding fields in the Register Credential form in ReleaseOwl under Basic Authentication.
In the Credential Manager, click on Register Credential.
Fill in the Credential Details:
Enter the following details:
Credential Name: Enter a name for your credential.
Credential Type: Select the appropriate credential type.
Obtain Client ID and Client Secret:
Log in to your UiPath Orchestrator account.
Click on your profile icon (usually in the top-right corner) and select Preferences.
In Preferences, go to the Privacy & Security section.
Click on View API Access.
Here, you will find your User Key, which acts as both the Client ID and Client Secret.
Copy and Paste Credentials:
Copy the Client ID and Client Secret from the View API Access section in UiPath.
Return to the Register Credential page in ReleaseOwl.
Paste the Client ID and Client Secret into the appropriate fields.
Click Save to register the credential.
Click on Credential Manager and then Register Credential.
Fill in the fields:
Credential Name: Enter a reference name of your choice.
Credential Type: Choose DocuSign.
Retrieve Client ID and Secret
Log in to DocuSign and click the “Admin”button.
Navigate to Integrations and select Apps and Keys.
Click Add App and Integration Key.
Copy the Integration Key which is nothing but the client id
Click on the “Add Secret Key” button which is nothing but the Client Secret
Set the Redirect URI to:
https://na3.releaseowl.com/rateloginserver/api/oauth/accesstoken
Check all allowed HTTP methods and click Save.
Save Credentials in ReleaseOwl
After creating the app successfully, click on the Actions button, then select Edit.
2. In the Apps and Keys section, locate:
API Account ID: This is the Account ID.
Account Base URL: This is the API Host URL.
Copy these URLs to paste them into the credential manager.
3. Use the following URLs:
Token URL: The DocuSign URL with /oauth/token.
Authorization URL: The DocuSign URL with /oauth/auth.
Copy all the credentials, paste them into the Register Credential, and click the Save button.
Generate a Token
1. In Credential Manager, select the created credential.
2. Click Generate Token to verify if the entered credentials are correct.
Click on the "Register Credential" button.
Fill in the required fields:
Credential Name: Enter a name of your choice.
Credential Type: Select CRT.
Username: Enter your CRT username.
Personal Access key : Provide the required access token ( found in your CRT account).
Follow these steps to register your 4Me credentials in the system:
Click on the "Register Credential" button.
Field
Description
Credential Name
Enter a name of your choice.
Credential Type
Select 4Me from the list.
Account
Enter WDC.
Access Token
Provide the required access token (found in your 4Me account).
GraphQL URL
Enter: https://graphql.4me.demo.com
4Me API URL
Enter: https://api.4me-demo.com
Click on the "Register Credential" button.
Field
Description
Credential Name
Enter a name of your choice.
Credential Type
Select Freshservice from the list.
Authentication Type
Select Basic authentication.
API Key
Enter your Freshservice API key.
Password
Enter the associated password.
Instance URL
Enter your Freshservice instance URL (e.g., https://<yourdomain.freshservice.com>).
Click on the "Register Credential" button.
Fill in the required fields:
Credential Type: Select Others for any basic authentication not covered by the available options.
Credential Name: Provide any name of your choice (e.g., "Custom Access").
Username: Enter your username for the required account.
Password: Enter the password associated with your username.
Click Save to finalize the setup and enable access to your required account.
Edit
You can edit the credentials by clicking the credential and the Edit/Create Credential screen pops up. Make the necessary changes and click Save. The changes get saved.
Delete
You can delete any credential by clicking the delete icon seen against that credential.
For information on setting up the tokens in GITHub, please refer to the link -
For information on setting up the tokens in BitBucket, please refer to the link -
For information on setting up the tokens in Azure DevOps, please refer to the link -
For more detailed guidance on creating service instances and service keys, please refer to the following resource:
Further information on getting the user token for SonarQube can be found @
For information on setting up the tokens in JIRA, please refer to the link -
Token URL: Enter the following URL: .