In my case, not really a management problem, more of a security policy to centralize keys/passwords/secrets in some sort of centralized 'vault' as well as support password rotations (i.e. changes) in ways that apps require little or no maintenance or experience little or no impacts when credentials change. At present AWS SecretManager is our 'vault' device.
This module seems to at least cover the first part: centralized vault. I am testing this out right now; after looking at the source, I feel it probably will cover that portion of my needs. Rotating passwords adds some other interesting dimensions to the problem (and a much deeper problem than just reading passwords from AWS SM).
All that said -- and this is nothing for or against this module -- simply just sharing some things I have learned: AWS has a passthru JDBC driver that delegates JDBC connection authorization to a SM record. You can find out more about it here:
https://github.com/aws/aws-secretsmanager-jdbc .
I have deployed as a module and configured datasources to use this driver and pretty much does what it says: gets credentials from a SM, but otherwise delegates to a JDBC driver. It doesn't do anything magical about credentials rotations (that I can tell).
I am thinking this module and the AWS SM/JDBC driver are about the same in this regard.
HTH...
FWIW
Transparent handling of credentials rotations is a bit more involved. That said, I have a mostly working solution for Quarkus. However, I tried to tap into CDI things mostly while building it, so that elements of the Quarkus solution can work in Wildfly too. In other words: have my Wildfly & Quarkus apps, just run, always get their DB credentials from SM and allow the credentials to be updated in SM and the apps just continue to work with no impact or need to restart or reconfigure and such..