-
Notifications
You must be signed in to change notification settings - Fork 3.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[RFE] Allow Approle and LDAP/AD Auth Mechanisms for AWX/Hashicorp Vault Token Integration #5076
Comments
PR: #6220 |
Really want this feature to exist. I'm working for a very large corporation and what we did is to store Vault credential as a custom secret. |
+1 |
1 similar comment
+1 |
@one-t could you take a look at this sometime |
This one is somewhat complex. The AppRole piece should fit in pretty easily but the LDAP part requires that hashicorp vault be configured to use LDAP for auth, which means running a few commands in the container and having it use the existing Red Hat Directory Server. We would also either need to make this a separate class or use it function scope since it would alter the configuration of the vault significantly. Flow would look like this for the LDAP portion
Gotchas to worry about:
|
I also think this might be a good issue for someone to pair up with me on because it touches a couple of external systems that a lot of QE folks haven't touched yet. |
@wenottingham is this a near-term priority that we should track more closely as an enhancement in the next major release? |
The approle bits were already merged, it is just LDAP/AD which is not. |
Hi @wenottingham, @ryanpetrello , any idea about the resolution of this topic ? please |
The prior comment stands - part of the subject of this issue had a pull request that was merged (AppRole)... there has been no changes for LDAP auth, so it remains open. |
ISSUE TYPE
SUMMARY
Currently, only static tokens are allowed as the inputs to integrate Hashicorp Vault with AWX. Customer wants the following:
For Approle:
Input approle_id (which exists on the Hashicorp Vault side) in a Vault Signed SSH and Vault Secrets credential. The resultant output of this will be the Secret Token being filled in and returned from the API call to Hashicorp Vault.
Docs >>>>> https://www.vaultproject.io/docs/auth/approle.html
For AD/LDAP:
Input username and password (AD/LDAP integration exists on the Hashicorp Vault side) in a Vault Signed SSH and Vault Secrets credential. The resultant output of this will be the Secret Token being filled in and returned from the API call to Hashicorp Vault.
Docs >>>>> https://www.vaultproject.io/docs/auth/ldap.html
Each time the credential is used, this API call should be made and the secret token should be updated. This will allow for short-lived TTLs on secret tokens and reduces the amount of manual effort to update secret tokens.
The text was updated successfully, but these errors were encountered: