-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New Templating Parameters for approle/ldap Auth Methods #5916
Comments
Token metadata will likely not be added to the available template parameters. For both of the use cases above, you can leverage the identity system. Each AppRole will create an entity in the identity system with a mapping to the role id. LDAP has a mapping to the username. Check out these guides for more information: |
Hi @chrishoffman , Sorry for bother you.
Could you provide more details about this? How about the entity lifecycle?
But how about AppRole's role name?
Best Regards, |
@chrishoffman can you elaborate why "Token metadata will likely not be added" ? having path like
could simplify lots of policies especially where approle plugin is being used. |
@sielaq Yes, that is true but these have to be encoded into each backend and do not provide centralized management available to all backends. We have seen requests in the past to extend token metadata to additional backends but have decided not to pursue it because it has to be customized per backend. The identity system provides the same functionality but centralizes all the functionality and makes it available to all auth methods. |
@chrishoffman thanks for clarification. Using vault-gatekeeper you can match the app name (that runs in mesos) with AppRole (role_name),
because |
How to write the templated ACL policies for AppRole?
Current Available Templating Parameters don't have role_name...
https://www.vaultproject.io/guides/identity/policy-templating.html
For approle token, we can find following info:
token_meta_role_name=<<approle name>>
For ldap token, we can find following info:
token_meta_username=<<ldap username>>
So, can we use token meta data as policy templating parameter? For example:
token.metadata.<<metadata key>>
Reference:
https://learn.hashicorp.com/vault/identity-access-management/policy-templating#available-templating-parameters
The text was updated successfully, but these errors were encountered: