I am trying to utilise AWS Secrets Manager to generate and automatically rotate secrets for my DB credentials (password).
From my research, it looks like one option is that the container running KeyCloak will need to be restarted when the secret is rotated. Alternatively, AWS provide a JDBC package that can cache secret information to obtain a new secret once it is rotated (GitHub - aws/aws-secretsmanager-jdbc: The AWS Secrets Manager JDBC Library enables Java developers to easily connect to SQL databases using secrets stored in AWS Secrets Manager.).
I am a Java novice, and was hoping I could get some advice on how to implement this on the KeyCloak server?
Alternatively, they provide this package (GitHub - aws/aws-secretsmanager-caching-java: The AWS Secrets Manager Java caching client enables in-process caching of secrets for Java applications.) to cache secrets from Secrets Manager.