The Bold Reports® allows you to connect to AWS Secrets Manager to dynamically retrieve database credentials and connect to your chosen database (e.g. SQL Server, PostgreSQL, and MySQL) within reports. This enhances security by centralizing credential management.
Before connecting Bold Reports® to AWS Secrets Manager, you must first create and configure a secret in your AWS account. This secret will store the credentials for your database.
Follow these steps to create a secret in AWS Secrets Manager:
Sign in to the AWS Management Console and open the Secrets Manager console. You can access it here: AWS Secrets Manager Console
In the Secrets Manager console, choose Secrets option from the left navigation panel, then click on the Store a new secret.

On the Choose secret type page, select the Other type of secret option. This allows you to manually define the key-value pairs or provide a custom JSON string for your database credentials.

In the Key/value pairs section, select the Key/value option then add your database credentials as individual key-value pairs. For proper integration with Bold Reports®, use the following valid keys:
| Engine | Valid Keys |
|---|---|
| SQL Server | server, data source, initial catalog, database, user id, uid, pwd, password, trusted_connection, integrated security, persist security info, encrypt, trustservercertificate, certificate, port, connect timeout, connection timeout |
| MySQL | server, host, port, database, db, uid, user id, userid, username, user, user name, pwd, password, sslmode, ssl mode, tlsversion, ssl-ca, sslcert, sslkey, sslverify, use compression, persist security info, allow public key retrieval, connection timeout, connect timeout, default command timeout |
| PostgreSQL | server, host, port, database, db, username, user id, uid, user name, pwd, password, sslmode, ssl mode, sslrootcert, sslcert, sslkey, sslcrl, trust server certificate, connect timeout, command timeout, timeout, client_encoding, options, keepalives, keepalives_idle, keepalives_interval, keepalives_count, integrated security, persist security info |

In the Configure secret section, enter a Secret name. You will use this Secret Name later when configuring the data source in Bold Reports®. Optionally, add a Description. Click Next, then complete the remaining configuration steps (for example rotation settings) until you reach the final Review page.

On the Review section, verify all your settings then click on the Store option to finalize the creation of your secret.
Your secret has now been created and is ready to be accessed by Bold Reports®.
To configure the AWS Secrets Manager data source, follow the below steps:

DATA configuration panel, click on the NEW DATA option.

AWS Secrets Manager as the data source type.

NEW DATASOURCE panel, provide the following details:
SQL Server from the Database Engine drop-down to use with the configured AWS Secrets Manager secret.
Connect option to connect Bold Reports® with the Microsoft SQL Server database.
Finish option to save the data source with a relevant name to proceed with designing report.

