vault

[!NOTE|label:references]

environment

install

  • macos

  • ubunut/debian

  • centos/rhel

compltion

status

get info

auth

  • list role type

  • list roles

  • read role

security

  • get token

list

  • list all path

  • list keys

  • get contents

approle

[!NOTE|label:references:]

via CLI

  • pre-setup

  • list

  • setup

get secret_id and role_id

operator

tokens

[!NOTE|label:references:]

TOKEN TYPE
VAULT 1.9.X +
VAULT 1.10 -

Service tokens

s.<random>

hvs.<random>

Batch tokens

b.<random>

hvb.<random>

Recovery tokens

r.<random>

hvr.<random>

[!TIP]

  • initial root token with no expiration

  • generate root token with share holders ( with unseal key )

    [!NOTE|label:references:]

    • example:

      • generate an otp code for the final token

      • start a root token generation:

      • enter an unseal key to progress root token generation:

  • check status

ssh

[!NOTE|label:references:]

client key sign

  • mount ssh secret engine

  • configure vault with a ca

  • add CA to all servers

  • create role

  • create ssh-key paire

  • sign the public key

  • saved the signed keys

host key sign

  • mount ssh security

  • configure CA

  • extend host key certificate ttls

  • create role

  • sign ssh public key

  • signed certificate as HostCertificate

verify

  • retrieve the host signing ca public key

  • add into ~/.ssh/authorized_keys

  • set verbose log level

  • check in /var/log/auth.log

usage

API

[!NOTE|label:references:]

CLI

[!NOTE|label:references:]

  • and more

basic usage

  • result

using vault with curl

[!TIP|label:references]

Last updated

Was this helpful?