Skip to main content

Cloud Credential

Description

The px pxb cloudcredential commands manage credentials for cloud and platform providers used by backup locations. You can create, get, update, delete, and manage ownership of cloud credentials.

Note on Access Control: For security purposes, cloud credentials shared with other users or groups provide Read-only access regardless of the access level specified. Only the owner has full administrative access to modify or delete cloud credentials.

Usage

Create Cloud Credential

px pxb create cloudcredential --name <cred-name> --provider <aws|azure|google|ibm|rancher> [flags]

Get Cloud Credential (Inspect)

px pxb get cloudcredential --name <cred-name> [--uid <uid>] [flags]

Get Cloud Credential (List All)

px pxb get cloudcredential [flags]

Update Cloud Credential

px pxb update cloudcredential --name <cred-name> [--uid <uid>] [flags]

Delete Cloud Credential

px pxb delete cloudcredential --name <cred-name> [--uid <uid>] [flags]

Update Ownership (Access Control)

px pxb update ownership cloudcredential --name <cred-name> [--uid <uid>] [flags]

Examples

Create AWS Credential

px pxb create cloudcredential \
--name aws-cred \
--provider aws \
--aws-access-key AKIA... \
--aws-secret-key wJalr...

Create Azure Credential (account key)

px pxb create cloudcredential \
--name azure-cred \
--provider azure \
--azure-account-name mystorage \
--azure-account-key SECRET

Create Azure Credential (service principal)

px pxb create cloudcredential \
--name azure-sp-cred \
--provider azure \
--azure-account-name mystorage \
--azure-account-key SECRET \
--azure-client-id <client-id> \
--azure-client-secret <client-secret> \
--azure-tenant-id <tenant-id> \
--azure-subscription-id <subscription-id>

Create Google Credential

px pxb create cloudcredential \
--name gcp-cred \
--provider google \
--google-project-id my-project \
--google-json-key /path/to/service-account.json

Create IBM Credential

px pxb create cloudcredential \
--name ibm-cred \
--provider ibm \
--ibm-api-key <api-key>

Create Rancher Credential

px pxb create cloudcredential \
--name rancher-cred \
--provider rancher \
--rancher-endpoint https://rancher.example.com \
--rancher-token <token>

Update Credential and Ownership

# Update AWS keys
px pxb update cloudcredential --name aws-cred --provider aws \
--aws-access-key NEW --aws-secret-key ROTATED

# Update ownership (Note: shared users get Read-only access for cloud credentials)
px pxb update ownership cloudcredential --name aws-cred \
--add-groups "team1=Read,ops=Read"

List, Inspect (detailed), and Delete

# List all credentials (table)
px pxb get cloudcredential

# Inspect a specific credential with secrets
px pxb get cloudcredential --name aws-cred --uid cred-12345 --detailed --include-secrets

# JSON output
px pxb get cloudcredential --name aws-cred --output json

# Delete
px pxb delete cloudcredential --name aws-cred

Flags for commands and sub-commands

Create Cloud Credential Flags

Required Flags

FlagShortTypeDescription
--name-nstringName of the credential (required, optional with --file)
--provider-pstringProvider: aws, azure, google, ibm, rancher

File Input

FlagShortTypeDescription
--file-fstringYAML/JSON file containing complete cloud credential configuration

AWS

FlagShortTypeDescription
--aws-access-keystringAWS access key ID
--aws-secret-keystringAWS secret access key

Azure

FlagShortTypeDescription
--azure-account-namestringStorage account name
--azure-account-keystringStorage account key
--azure-client-idstringService principal client ID (optional)
--azure-client-secretstringService principal client secret (optional)
--azure-tenant-idstringService principal tenant ID (optional)
--azure-subscription-idstringService principal subscription ID (optional)

Google

FlagShortTypeDescription
--google-project-idstringGoogle Cloud project ID
--google-json-keystringPath to service account JSON key file

IBM

FlagShortTypeDescription
--ibm-api-keystringIBM Cloud API key

Rancher

FlagShortTypeDescription
--rancher-endpointstringRancher server endpoint URL
--rancher-tokenstringRancher access token

Get Cloud Credential Flags

Resource Identification

FlagShortTypeDescription
--name-nstringName of credential to inspect (required for inspect; omit to enumerate)
--uidstringUID of credential (optional; use with --name to disambiguate)

Display Options

FlagShortTypeDescription
--detailedboolShow detailed credential information
--include-secretsboolInclude secrets in output (where supported)

File Input

FlagShortTypeDescription
--file-fstringYAML/JSON file with inspect configuration (name/uid may come from file)

Update Cloud Credential Flags

Required Identification

FlagShortTypeDescription
--name-nstringName of credential to update (required, optional with --file)
--uidstringUID of credential to update (optional)

Provider Selection

FlagShortTypeDescription
--provider-pstringProvider: aws, azure, google, ibm, rancher

Provider-specific Flags

ProviderFlags
AWS--aws-access-key, --aws-secret-key
Azure--azure-account-name, --azure-account-key, --azure-client-id, --azure-client-secret, --azure-tenant-id, --azure-subscription-id
Google--google-project-id, --google-json-key
IBM--ibm-api-key
Rancher--rancher-endpoint, --rancher-token

File Input

FlagShortTypeDescription
--file-fstringYAML/JSON file with update configuration; CLI flags override file values

Delete Cloud Credential Flags

Required Identification

FlagShortTypeDescription
--name-nstringName of credential to delete (required, optional with --file)
--uidstringUID of credential to delete (optional)

File Input

FlagShortTypeDescription
--file-fstringYAML/JSON file with delete configuration; CLI flags override file values

Ownership Update Flags

Required Identification

FlagShortTypeDescription
--name-nstringName of the cloud credential (required, optional with --file)
--uidstringUID of the cloud credential (optional)

Ownership Options

FlagShortTypeDescription
--add-groupsmapAdd groups with access levels (group=Read) - Note: shared users get Read-only access
--add-collaboratorsmapAdd collaborators with access levels (user=Read) - Note: shared users get Read-only access
--public-access-controlstringPublic access control level (Read recommended - shared users get Read-only access)

Granular File Input

FlagShortTypeDescription
--add-groups-filestringJSON file containing groups configuration
--add-collaborators-filestringJSON file containing collaborators configuration

File Input

FlagShortTypeDescription
--file-fstringYAML/JSON file with ownership configuration; CLI flags override file values

Notes

  • Get behavior: Inspect when --name (and optionally --uid) is provided; enumerate when omitted.
  • For update, delete, and ownership: --name is required; --uid is optional and used to disambiguate.
  • Provider-specific fields must match the selected --provider.
  • File vs CLI precedence: You can mix --file with flags; CLI flags override file values. When using --file, required --name may come from the file.
  • Display controls: --detailed and --include-secrets apply to both inspect and enumerate.

Output Format Support

  • --output table (default)
  • --output json
  • --output yaml
  • --output name (for get)

Authentication and Context

  • Organization ID from context
  • Authentication token from context