vault
[!NOTE|label:references]
environment
install
macos
ubunut/debian
centos/rhel
compltion
status
get info
auth
list role type
list roles
read role
security
get token
list
list all path
list keys
get contents
approle
[!NOTE|label:references:]
via CLI
pre-setup
list
setup
get secret_id and role_id
operator
tokens
[!NOTE|label:references:]
Service tokens
s.<random>
hvs.<random>
Batch tokens
b.<random>
hvb.<random>
Recovery tokens
r.<random>
hvr.<random>
[!TIP]
/sys/generate-root the API key for root tokens
initial root token with no expiration
generate root token with share holders ( with unseal key )
[!NOTE|label:references:]
unseal key is necessary to generate root token
example:
generate an otp code for the final token
start a root token generation:
enter an unseal key to progress root token generation:
check status
seal/unseal
ssh
[!NOTE|label:references:]
client key sign
mount ssh secret engine
configure vault with a ca
add CA to all servers
create role
create ssh-key paire
sign the public key
saved the signed keys
host key sign
mount ssh security
configure CA
extend host key certificate ttls
create role
sign ssh public key
signed certificate as
HostCertificate
verify
retrieve the host signing ca public key
add into ~/.ssh/authorized_keys
set verbose log level
check in
/var/log/auth.log
usage
API
[!NOTE|label:references:]
CLI
[!NOTE|label:references:]
and more
basic usage
result
using vault with curl
[!TIP|label:references]
Last updated
Was this helpful?