You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Disclaimer: I hand this in as a feature request, because from my understanding the current behavior of the following is not a bug but the intended behavior.
From my understanding the Create Role function can take parameters to bind a role to certain AWS facts like bound_account_id for example. However in our company setup we maintain several AWS Accounts. They hold for example the staging environment and developer test environments. So the applications running in these accounts are mostly the same (a subset of ~100 microservices).
I have Vault running in one of these accounts and the server has an IAM role which can assume a role on other accounts as described here in the docs.
What I would like to do is, to create a Vault role that a service can use from different accounts. However if I give the Create Role function multiple IDs as bound_account_id (or multiple VPC IDs as bound_vpc_id it happily accepts it, but I can not authenticate.
Hi @hrzbrg -- correct, this is a limitation of the auth backend. You would need to create one role for each of the bound VPCs, though you can associate the same set of policies with each of those roles.
As an alternative workaround, you could switch to using the aws auth_type and have each of your instances call sts:AssumeRole with the same role. You could then just bind a single Vault role to that role ARN. (Basically, this just uses sts:AssumeRole as a layer of abstraction.)
Feature Request:
Disclaimer: I hand this in as a feature request, because from my understanding the current behavior of the following is not a bug but the intended behavior.
From my understanding the Create Role function can take parameters to bind a role to certain AWS facts like
bound_account_id
for example. However in our company setup we maintain several AWS Accounts. They hold for example the staging environment and developer test environments. So the applications running in these accounts are mostly the same (a subset of ~100 microservices).I have Vault running in one of these accounts and the server has an IAM role which can assume a role on other accounts as described here in the docs.
What I would like to do is, to create a Vault role that a service can use from different accounts. However if I give the Create Role function multiple IDs as
bound_account_id
(or multiple VPC IDs asbound_vpc_id
it happily accepts it, but I can not authenticate.Role:
Error:
It would be great to see the above role working, or a good hint on how the intended way of using roles in the described setup would be.
The text was updated successfully, but these errors were encountered: