We are trying to configure Credentials Provider to use the SailPoint ISC PTA workflows for Security Group Creation.
During configuration we are observing below errors -
Error while fetching secret secrets://TestSecretManager/arn:aws:secretsmanager:us-east-1:676206545666test_AdEnv_service_account_cred-fwKuop : 1 validation error detected: Value null at ‘secretId’ failed to satisfy constraint: Member must not be null (Service: SecretsManager, Status Code: 400, Request ID: be77e17f-5c6f-480b-9dc7-93cc4dcb8840) (SDK Attempt Count: 1), Please verify provided secret expression
In the credential provider the authentication type is - IAM Role.
Has anyone has faced similar error ? Any inputs will help.
Below is a quick triage checklist that usually clears the “Value null at ‘secretId’ failed to satisfy constraint” error when you call AWS Secrets Manager from the SailPoint IdentityNow (IDN) Credentials Provider.
1 Check the secret‑path expression first (> 80 % of cases)
What to verify
Correct pattern
Typical pitfall
Prefix
secrets://
Misspelled/missing
Provider alias
TestSecretManager (must match the alias you created in Admin → Connections → Credential Providers)
Missing GetSecretValue gives AccessDenied; the “null secretId” message appears before the SDK call, so fix the path first, then permissions.
3 Other quick checks
Check
Why / what to do
Region mismatch
Provider config region must be us‑east‑1 if that’s where the secret lives.
Execution environment
Make sure the VA / Connector host is actually assuming the IAM role you selected (look in the VA log for Assumed role:…).
Secret format
If you’re storing a JSON blob, include the key (e.g., /password). For plain text, omit the key.
Validate with AWS CLI
From the same subnet / role: aws secretsmanager get-secret-value --secret-id test_AdEnv_service_account_cred-fwKuop --region us-east-1 – proves the secret itself is healthy.
hi Sukanta, I work with Tanay and took a look at this issue today. I am seeing something odd in the error message - it refers to “secretId” but the correct attribute name is “SecretId” and it is case sensitive. We have confirmed that the secret is returned via AWS CLI and “SecretId” is the correct name for the attribute. is SailPoint changing the case on that attribute name?