Skip to content
GitLab
Menu
Projects
Groups
Snippets
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Sign in
Toggle navigation
Menu
Open sidebar
小 白蛋
Vault
Commits
a2924e1e
Commit
a2924e1e
authored
6 years ago
by
emily
Committed by
Becca Petrin
6 years ago
Browse files
Options
Download
Email Patches
Plain Diff
fix permissions in GCP auth docs (#7035)
parent
15d2fdd5
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
website/source/docs/auth/gcp.html.md
+36
-7
website/source/docs/auth/gcp.html.md
with
36 additions
and
7 deletions
+36
-7
website/source/docs/auth/gcp.html.md
+
36
-
7
View file @
a2924e1e
...
...
@@ -141,23 +141,52 @@ scope:
https://www.googleapis.com/auth/cloud-platform
```
### Required Permissions
### Required
GCP
Permissions
The credentials given to Vault must have the following roles:
#### Vault Server Permissions
**For `iam`-type Vault roles**
, Vault can be given the following roles:
```
text
roles/iam.serviceAccountKeyAdmin
roles/browser
```
Note that this is the permission
**given to the Vault servers**
. The IAM
service account or GCE instance that is authenticating _against_ Vault must
have the following role:
**For `gce`-type Vault roles**
, Vault can be given the following roles:
```
text
roles/
iam.serviceAccountTokenCreato
r
roles/
compute.viewe
r
```
If you instead wish to create a custom role with only the exact GCP permissions
required, use the following list of permissions:
```
text
iam.serviceAccounts.get
iam.serviceAccountKeys.get
compute.instances.get
compute.instanceGroups.list
compute.instanceGroups.listInstances
```
These allow Vault to:
*
verify the service account, either directly authenticating or associated with
authenticating GCE instance, exists
*
get the corresponding public keys for verifying JWTs signed by service account
private keys.
*
verify authenticating GCE instances exist
*
compare bound fields for GCE roles (zone/region, labels, or membership
in given instance groups)
#### Permissions For Authenticating Against Vault
Note that the previously mentioned permissions are given to the _Vault servers_.
The IAM service account or GCE instance that is
**authenticating against Vault**
must have the following role:
```
text
roles/iam.serviceAccountTokenCreator
```
## Group Aliases
...
...
This diff is collapsed.
Click to expand it.
Write
Preview
Supports
Markdown
0%
Try again
or
attach a new file
.
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment