Skip to content
GitLab
Menu
Projects
Groups
Snippets
Help
Projects
Groups
Snippets
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Sign in
Toggle navigation
Menu
Open sidebar
小 白蛋
Vault
Commits
91bb2ceb
Unverified
Commit
91bb2ceb
authored
3 years ago
by
Mike Green
Committed by
GitHub
3 years ago
Browse files
Options
Download
Email Patches
Plain Diff
Add agent approle method example (#12297)
parent
594aed32
Branches unavailable
v1.10.2
v1.10.1
v1.10.0
v1.10.0-rc1
v1.9.6
v1.9.5
v1.9.4
v1.9.3
v1.9.2
v1.9.1
v1.9.0
v1.9.0-rc1
sdk/v0.4.1
sdk/v0.4.0
sdk/v0.3.0
last-go-modable
api/v1.5.0
api/v1.4.1
api/v1.4.0
api/v1.3.1
api/v1.3.0
api/v1.2.0
api/auth/userpass/v0.1.0
api/auth/ldap/v0.1.0
api/auth/kubernetes/v0.1.0
api/auth/gcp/v0.1.0
api/auth/azure/v0.1.0
api/auth/aws/v0.1.0
api/auth/approle/v0.1.1
api/auth/approle/v0.1.0
No related merge requests found
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
website/content/docs/agent/autoauth/methods/approle.mdx
+62
-1
website/content/docs/agent/autoauth/methods/approle.mdx
with
62 additions
and
1 deletion
+62
-1
website/content/docs/agent/autoauth/methods/approle.mdx
+
62
-
1
View file @
91bb2ceb
...
...
@@ -23,7 +23,8 @@ cached.
- `secret_id_file_path` `(string: optional)` - The path to the file with secret
ID.
If not set, only the `role-id` will be used. \
In that case, the AppRole should have `bind_secret_id` set to `false` otherwise Vault Agent wouldn't be able to login.
In that case, the AppRole should have `bind_secret_id` set to `false` otherwise
Vault Agent wouldn't be able to login.
- `remove_secret_id_file_after_reading` `(bool: optional, defaults to true)` -
This can be set to `false` to disable the default behavior of removing the
...
...
@@ -35,3 +36,63 @@ cached.
containing the output of the secret ID retrieval endpoint for the role (e.g.
`auth/approle/role/webservers/secret-id`) and the creation path for the
response-wrapping token must match the value set here.
## Example Configuration
An example configuration, using approle to enable [auto-auth](/docs/agent/autoauth)
and creating both a plaintext token sink and a [response-wrapped token sink file](/docs/agent/autoauth#wrap_ttl), follows:
```python
pid_file = "./pidfile"
vault {
address = "https://127.0.0.1:8200"
}
auto_auth {
method {
type = "approle"
config = {
role_id_file_path = "roleid"
secret_id_file_path = "secretid"
remove_secret_id_file_after_reading = false
}
}
sink {
type = "file"
wrap_ttl = "30m"
config = {
path = "sink_file_wrapped_1.txt"
}
}
sink {
type = "file"
config = {
path = "sink_file_unwrapped_2.txt"
}
}
}
cache {
use_auto_auth_token = true
}
listener "tcp" {
address = "127.0.0.1:8100"
tls_disable = true
}
template {
source = "/etc/vault/server.key.ctmpl"
destination = "/etc/vault/server.key"
}
template {
source = "/etc/vault/server.crt.ctmpl"
destination = "/etc/vault/server.crt"
}
```
This diff is collapsed.
Click to expand it.
Write
Preview
Supports
Markdown
0%
Try again
or
attach a new file
.
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment
Menu
Projects
Groups
Snippets
Help