The Delinea Secret Server Python SDK contains classes that interact with Secret Server via the REST API.
python -m pip install python-tss-sdkThere are three ways in which you can authorize the SecretServer and SecretServerCloud classes to fetch secrets.
- Password Authorization (with
PasswordGrantAuthorizer) - Domain Authorization (with
DomainPasswordGrantAuthorizer) - Access Token Authorization (with
AccessTokenAuthorizer)
If using traditional username and password authentication to log in to your Secret Server, you can pass the PasswordGrantAuthorizer into the SecretServer class at instantiation. The PasswordGrantAuthorizer requires a base_url, username, and password. It optionally takes a token_path_uri, but defaults to /oauth2/token.
from delinea.secrets.server import PasswordGrantAuthorizer
authorizer = PasswordGrantAuthorizer("https://hostname/SecretServer", os.getenv("myusername"), os.getenv("password")")To use a domain credential, use the DomainPasswordGrantAuthorizer. It requires a base_url, username, domain, and password. It optionally takes a token_path_uri, but defaults to /oauth2/token.
from delinea.secrets.server import DomainPasswordGrantAuthorizer
authorizer = DomainPasswordGrantAuthorizer("https://hostname/SecretServer", os.getenv("myusername"), os.getenv("mydomain"), os.getenv("password"))If you already have an access_token, you can pass directly via the AccessTokenAuthorizer.
from delinea.secrets.server import AccessTokenAuthorizer
authorizer = AccessTokenAuthorizer("AgJ1slfZsEng9bKsssB-tic0Kh8I...")The SDK API requires an Authorizer and a tenant.
tenant simplifies the configuration when using Secret Server Cloud by assuming the default folder structure and creating the base URL from a template that takes the tenant and an optional top-level domain (TLD) that defaults to com, as parameters.
Instantiate the SecretServerCloud class with tenant and an Authorizer (optionally include a tld). To retrieve a secret, pass an integer id to get_secret() which will return the secret as a JSON encoded string.
from delinea.secrets.server import SecretServerCloud
secret_server = SecretServerCloud("mytenant", authorizer)
secret = secret_server.get_secret(1)The SDK API also contains a Secret @dataclass containing a subset of the Secret's attributes and a dictionary of all the fields keyed by the Secret's slug.
NOTE: In v1.0.0
SecretServerreplacesSecretServerV1. However,SecretServerV0is available to use instead, for backwards compatibility with v0.0.5 and v0.0.6.
To instantiate the SecretServer class, it requires a base_url, an Authorizer object (see above), and an optional api_path_uri (defaults to "/api/v1")
from delinea.secrets.server import SecretServer
secret_server = SecretServer("https://hostname/SecretServer", my_authorizer)Secrets can be fetched using the get_secret method, which takes an integer id of the secret and, returns a json object:
secret = secret_server.get_secret(1)
print(f"username: {secret.fields['username'].value}\npassword: {secret.fields['password'].value}")Alternatively, you can use pass the json to ServerSecret which returns a dataclass object representation of the secret:
from delinea.secrets.server import ServerSecret
secret = ServerSecret(**secret_server.get_secret(1))
username = secret.fields['username'].valueIt is also now possible to fetch a secret by the secrets path using the get_secret_by_path method on the SecretServer object. This, too, returns a json object.
secret = secret_server.get_secret_by_path(r"\FolderPath\Secret Name")
print(f"username: {secret.fields['username'].value}\npassword: {secret.fields['password'].value}")Note: The
pathmust be the full folder path and name of the secret.
When using a self-signed certificate for SSL, the REQUESTS_CA_BUNDLE environment variable should be set to the path of the certificate (in .pem format). This will negate the need to ignore SSL certificate verification, which makes your application vunerable. Please reference the requests documentation for further details on the REQUESTS_CA_BUNDLE environment variable, should you require it.
The SDK requires Python 3.8 or higher.
First, ensure Python is in $PATH, then run:
# Clone the repo
git clone https://github.com/DelineaXPM/python-tss-sdk
cd python-tss-sdk
# Create a virtual environment
python -m venv venv
. venv/bin/activate
# Install dependencies
python -m pip install --upgrade pip
pip install -r requirements.txtValid credentials are required to run the unit tests. The credentials should be stored in environment variables or in a .env file:
export TSS_USERNAME=myusername
export TSS_PASSWORD=mysecretpassword
export TSS_TENANT=mytenant
export TSS_SECRET_ID=42
export TSS_SECRET_PATH=\Test Secrets\SecretNameThe tests assume that the user associated with the specified TSS_USERNAME and TSS_PASSWORD can read the secret to be fetched, and that the Secret itself contains username and password fields.
To run the tests with tox:
toxTo build the package, use Flit:
flit build