You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
[DOCS] Add GUI for Azure/AWS/GCP Secret Engines configuration (#29647)
* wip
* finish azure docs
* some fixes
* get role heading to where it was
* Apply suggestions from code review
Co-authored-by: Sarah Chavis <[email protected]>
* Update website/content/docs/secrets/azure.mdx
Co-authored-by: Sarah Chavis <[email protected]>
* pr comments
* add aws
* gcp configuration
* fix formatting
* remove indents for parser
* formatting fixed?
* Update website/content/docs/secrets/gcp.mdx
Co-authored-by: Sarah Chavis <[email protected]>
* Apply suggestions from code review
Co-authored-by: Sarah Chavis <[email protected]>
* try again
* might be the end of me
* tried running npm run format and got some promising results
* missed
* this should work
* numbering fixes
* Apply suggestions from code review
add group="gui"
Co-authored-by: Sarah Chavis <[email protected]>
* Update azure.mdx
change heading to match
---------
Co-authored-by: Sarah Chavis <[email protected]>
~> **Notice:** Even though the path above is `aws/config/root`, do not use
149
+
your AWS root account credentials. Instead, generate a dedicated user or
150
+
role.
151
+
152
+
Alternatively, configure the audience claim value and the role ARN to assume for plugin workload identity federation:
153
+
154
+
<Tabs>
155
+
156
+
<Tabheading="CLI"group="cli">
157
+
158
+
```shell-session
159
+
$ vault write aws/config/root \
160
+
identity_token_audience="<TOKEN AUDIENCE>" \
161
+
role_arn="<AWS ROLE ARN>"
162
+
```
163
+
164
+
</Tab>
165
+
166
+
<Tabheading="GUI"group="gui">
167
+
168
+
Select **Workload Identity Federation** for Access Type and enter the following information:
169
+

170
+
171
+
-**Issuer URL**: The fully qualified and network-reachable issuer URL for the Vault plugin identity token issuer. For example, `https://vault.example.com/v1/identity/oidc/plugins`.
172
+
-**Role ARN**: The ARN of the AWS IAM role to assume.
173
+
-**Identity token audience**: The audience claim value for the plugin identity tokens. This value must match the allowed audiences configured for the target Federated Identity Credential.
174
+
175
+
</Tab>
176
+
177
+
</Tabs>
178
+
179
+
## Role setup
180
+
Vault's identity token provider will internally sign the plugin identity token JWT.
181
+
Given a trust relationship is configured between Vault and AWS via
182
+
Web Identity Federation, the secrets engine can exchange this identity token to obtain
183
+
ephemeral STS credentials.
104
184
105
-
Vault's identity token provider will internally sign the plugin identity token JWT.
106
-
Given a trust relationship is configured between Vault and AWS via
107
-
Web Identity Federation, the secrets engine can exchange this identity token to obtain
108
-
ephemeral STS credentials.
109
-
110
-
~> **Notice:** For this trust relationship to be established, AWS must have an
111
-
an [IAM OIDC identity provider](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_oidc.html)
112
-
configured with information about the fully qualified and network-reachable
113
-
Issuer URL for Vault's plugin [identity token provider](/vault/api-docs/secret/identity/tokens#read-plugin-identity-well-known-configurations).
114
-
This is to ensure that AWS can fetch the JWKS [public keys](/vault/api-docs/secret/identity/tokens#read-active-public-keys)
115
-
and verify the plugin identity token signature. To configure Vault's Issuer,
0 commit comments