List of AWS Secrets Manager Integrations
This is a list of platforms and tools that integrate with AWS Secrets Manager. This list is updated as of May 2026.
-
1
Amazon DocumentDB
Amazon
Scalable, reliable document database solution for MongoDB workloads.Amazon DocumentDB, designed to be compatible with MongoDB, provides a fast, scalable, highly available, and fully managed document database solution tailored to handle MongoDB workloads efficiently. By streamlining the tasks of storing, querying, and indexing JSON data, this service emerges as an optimal option for various users. As a non-relational database specifically crafted for high performance, Amazon DocumentDB is built to deliver the scalability and availability needed for critical MongoDB operations on a large scale. Its architecture separates storage from compute, enabling each component to scale independently, which results in enhanced read capacity that can reach millions of requests per second by adding up to 15 low-latency read replicas in mere minutes, irrespective of the dataset size. With an impressive 99.99% availability guarantee, Amazon DocumentDB safeguards your data by replicating it six times across three distinct AWS Availability Zones (AZs), providing exceptional data protection and reliability. Additionally, this service proves especially advantageous for organizations that demand flexible and efficient database resource management, allowing them to adapt quickly to changing needs and workloads. -
2
Cluster.dev
Cluster.dev
Master your cloud-native infrastructure with seamless customization and control.Cluster.dev stands out as the quintessential management platform for cloud-native infrastructures, adeptly merging the various functionalities of your current infrastructure tools. It enables teams to create platform-as-a-service environments that cater specifically to their unique requirements while allowing for customization of both projects and infrastructures. By centralizing all modifications and the overall condition of your infrastructure within your Git repository, monitoring becomes a simple task. This platform removes the necessity for cumbersome manual runbooks and intricate CI/CD processes, ensuring you have a comprehensive view of your infrastructure at all times. With Cluster.dev, you can make infrastructure changes with assurance, knowing that all your tools will operate as expected. Every component of Cluster.dev, from scripts to Kubernetes manifests, is meticulously tracked and maintained. The platform guarantees security and autonomy from external vendors, allowing for the safe transmission of secrets to third-party applications even if they do not align with your secret storage solutions. Furthermore, the exceptional template engine of Cluster.dev presents unmatched customization possibilities across all facets of your infrastructure, enabling you to adjust configurations, scripts, manifests, and Terraform code according to your specific needs. In an era of rapid technological advancement, the versatility of such a tool proves to be essential for sustaining control and adaptability, ultimately fostering innovation and efficiency in cloud management. With Cluster.dev, organizations can navigate the complexities of infrastructure management with ease and confidence. -
3
Clutch
Clutch
Secure non-human identities for a resilient digital future.Clutch is addressing the increasingly critical challenge of securing non-human identities within modern enterprises. With the expansion and advancement of digital infrastructures, the management and protection of non-human identities—such as API keys, secrets, tokens, and service accounts—has emerged as a pivotal, albeit often neglected, aspect of cybersecurity. Recognizing this gap in security, Clutch is developing a dedicated platform designed specifically to ensure comprehensive protection and management of these identities. This innovative solution aims to bolster the digital framework of organizations, fostering a secure, resilient, and dependable environment for their operations. The rise of non-human identities is remarkable, with their numbers outstripping human identities by a staggering 45 to 1, and these identities possess considerable privileges and broad access necessary for essential automated functions. Furthermore, they frequently lack vital security features such as multi-factor authentication and conditional access policies, amplifying the urgency of their protection. By tackling these vulnerabilities, Clutch is paving the way for stronger integrity in automated systems across various enterprises, ultimately enhancing their overall cybersecurity posture. This proactive approach not only safeguards sensitive data but also fortifies the trust in automated processes that are becoming increasingly integral to business operations. -
4
Inventor Nastran
Autodesk
Transform your design process with advanced simulation capabilities.Inventor® Nastran® functions as a finite element analysis (FEA) solution embedded within CAD applications, allowing engineers and analysts to conduct a wide variety of studies with different materials. It offers extensive simulation capabilities, covering both linear and nonlinear stress evaluations, dynamic analyses, and heat transfer calculations. This tool is part of the Product Design & Manufacturing Collection, which comprises an array of robust tools aimed at optimizing workflows in Inventor. Alongside its sophisticated simulation functionalities, the collection includes 5-axis CAM systems, nesting solutions, and grants access to software such as AutoCAD and Fusion 360, fostering a comprehensive approach to the product design and manufacturing landscape. By leveraging Inventor Nastran, professionals can not only enhance their analytical processes but also achieve significantly better design results that meet industry standards. Ultimately, this integration empowers teams to innovate and improve efficiency within their projects.