Fix broken guide links + small authn/authz wording adjustments
This commit is contained in:
parent
196fab4c38
commit
c8a2165a33
|
@ -29,14 +29,14 @@ features for multi-tenant deployments are offered exclusively in the enterprise
|
||||||
version. This documentation may need to be adapted to your deployment situation,
|
version. This documentation may need to be adapted to your deployment situation,
|
||||||
but the general mechanisms for a secure Nomad deployment revolve around:
|
but the general mechanisms for a secure Nomad deployment revolve around:
|
||||||
|
|
||||||
* **[mTLS](/guides/security/securing-nomad.html)** -
|
* **[mTLS](https://learn.hashicorp.com/tutorials/nomad/security-enable-tls)** -
|
||||||
Mutual authorization of both the TLS server and client x509 certificates
|
Mutual authentication of both the TLS server and client x509 certificates
|
||||||
prevents internal abuse by preventing unauthorized access to network
|
prevents internal abuse by preventing unauthenticated access to network
|
||||||
components within the cluster.
|
components within the cluster.
|
||||||
|
|
||||||
* **[ACLs](/guides/security/acl.html)** - Allow for
|
* **[ACLs](https://learn.hashicorp.com/collections/nomad/access-control)** - Enables
|
||||||
roles to be applied to authorized connections by granting capabilities for a
|
authorization for authenticated connections by granting capabilities to ACL
|
||||||
token.
|
tokens.
|
||||||
|
|
||||||
* **[Namespaces](/docs/enterprise/index.html#namespaces)**
|
* **[Namespaces](/docs/enterprise/index.html#namespaces)**
|
||||||
(**Enterprise Only**) - Access to read and write to a Namepsace can be
|
(**Enterprise Only**) - Access to read and write to a Namepsace can be
|
||||||
|
@ -55,7 +55,7 @@ granularity may change depending on your team's use case where rigorous roles
|
||||||
can be accurately defined and managed using the [Nomad backend secret engine for
|
can be accurately defined and managed using the [Nomad backend secret engine for
|
||||||
Vault](https://www.vaultproject.io/docs/secrets/nomad/index.html). This is
|
Vault](https://www.vaultproject.io/docs/secrets/nomad/index.html). This is
|
||||||
described further with getting started steps using a development server
|
described further with getting started steps using a development server
|
||||||
[here](/guides/security/acl.html#vault-integration).
|
[here](https://learn.hashicorp.com/collections/nomad/access-control).
|
||||||
|
|
||||||
It's important to note that there's no traditional concept of a user
|
It's important to note that there's no traditional concept of a user
|
||||||
within Nomad itself.
|
within Nomad itself.
|
||||||
|
@ -96,7 +96,7 @@ recommendations accordingly.
|
||||||
|
|
||||||
#### Requirements
|
#### Requirements
|
||||||
|
|
||||||
* **[mTLS enabled](/guides/security/securing-nomad.html)**
|
* **[mTLS enabled](https://learn.hashicorp.com/tutorials/nomad/security-enable-tls)**
|
||||||
- Mutual TLS (mTLS) enables [mutual
|
- Mutual TLS (mTLS) enables [mutual
|
||||||
authentication](https://en.wikipedia.org/wiki/Mutual_authentication) with
|
authentication](https://en.wikipedia.org/wiki/Mutual_authentication) with
|
||||||
security properties to prevent the following problems:
|
security properties to prevent the following problems:
|
||||||
|
@ -115,7 +115,7 @@ recommendations accordingly.
|
||||||
certificates to ensure mTLS is actually enabled. This requires appropriate
|
certificates to ensure mTLS is actually enabled. This requires appropriate
|
||||||
certificates to be distributed to servers, clients, machines, or operators
|
certificates to be distributed to servers, clients, machines, or operators
|
||||||
for things like CLI usage. It is recommended to use
|
for things like CLI usage. It is recommended to use
|
||||||
[Vault](/guides/security/vault-pki-integration.html)
|
[Vault](https://learn.hashicorp.com/tutorials/nomad/vault-pki-nomad)
|
||||||
to securely manage the certificate creation and rotation for nodes.
|
to securely manage the certificate creation and rotation for nodes.
|
||||||
|
|
||||||
* Agent role misconfiguration is prevented using the X.509
|
* Agent role misconfiguration is prevented using the X.509
|
||||||
|
@ -129,28 +129,28 @@ recommendations accordingly.
|
||||||
the same CA. This also avoids any potential pitfalls with certificates using
|
the same CA. This also avoids any potential pitfalls with certificates using
|
||||||
the IP or Hostname of nodes within a cluster.
|
the IP or Hostname of nodes within a cluster.
|
||||||
|
|
||||||
* **[ACLs enabled](/guides/security/acl.html)** - The
|
* **[ACLs enabled](https://learn.hashicorp.com/collections/nomad/access-control)** - The
|
||||||
access control list (ACL) system provides a capability-based control
|
access control list (ACL) system provides a capability-based control
|
||||||
mechanism for Nomad administrators allowing for custom roles (typically
|
mechanism for Nomad administrators allowing for custom roles (typically
|
||||||
within Vault) to be tied to an individual human or machine operator
|
within Vault) to be tied to an individual human or machine operator
|
||||||
identity. This allows for access to capabilities within the cluster to be
|
identity. This allows for access to capabilities within the cluster to be
|
||||||
restricted to specific users.
|
restricted to specific users.
|
||||||
|
|
||||||
* **[Sentinel Policies](/guides/governance-and-policy/sentinel/sentinel-policy.html)**
|
* **[Sentinel Policies](https://learn.hashicorp.com/tutorials/nomad/sentinel)**
|
||||||
(**Enterprise Only**) - [Sentinel](https://www.hashicorp.com/sentinel/) is
|
(**Enterprise Only**) - [Sentinel](https://www.hashicorp.com/sentinel/) is
|
||||||
a feature which enables
|
a feature which enables
|
||||||
[policy-as-code](https://docs.hashicorp.com/sentinel/concepts/policy-as-code/)
|
[policy-as-code](https://docs.hashicorp.com/sentinel/concepts/policy-as-code/)
|
||||||
to enforce further restrictions on operators. This is used to augment the
|
to enforce further restrictions on operators. This is used to augment the
|
||||||
built-in ACL system for fine-grained control over jobs.
|
built-in ACL system for fine-grained control over jobs.
|
||||||
|
|
||||||
* **[Namespaces](/guides/governance-and-policy/namespaces.html)**
|
* **[Namespaces](https://learn.hashicorp.com/tutorials/nomad/namespaces)**
|
||||||
(**Enterprise Only**) - This feature allows for a cluster to be shared by
|
(**Enterprise Only**) - This feature allows for a cluster to be shared by
|
||||||
multiple teams within a company. Using this logical separation is important
|
multiple teams within a company. Using this logical separation is important
|
||||||
for multi-tenant clusters to prevent users without access to that namespace
|
for multi-tenant clusters to prevent users without access to that namespace
|
||||||
from conflicting with each other. This requires ACLs to be enabled in order
|
from conflicting with each other. This requires ACLs to be enabled in order
|
||||||
to be enforced.
|
to be enforced.
|
||||||
|
|
||||||
* **[Resource Quotas](/guides/governance-and-policy/quotas.html)**
|
* **[Resource Quotas](https://learn.hashicorp.com/tutorials/nomad/quotas)**
|
||||||
(**Enterprise Only**) - Can limit a namespace's access to the underlying
|
(**Enterprise Only**) - Can limit a namespace's access to the underlying
|
||||||
compute resources in the cluster by setting upper-limits for operators.
|
compute resources in the cluster by setting upper-limits for operators.
|
||||||
Access to these resource quotas can be managed via ACLs to ensure read-only
|
Access to these resource quotas can be managed via ACLs to ensure read-only
|
||||||
|
@ -174,7 +174,7 @@ environment.
|
||||||
on disk on an operator's local machine.
|
on disk on an operator's local machine.
|
||||||
|
|
||||||
* Rotate credentials used by the Nomad agent; e.g. [integrate with Vault's
|
* Rotate credentials used by the Nomad agent; e.g. [integrate with Vault's
|
||||||
PKI secret engine](/guides/security/vault-pki-integration.html) to
|
PKI secret engine](https://learn.hashicorp.com/tutorials/nomad/vault-pki-nomad) to
|
||||||
automatically generate and renew dynamic, unique X.509 certificates for each
|
automatically generate and renew dynamic, unique X.509 certificates for each
|
||||||
Nomad node with a short [TTL](https://en.wikipedia.org/wiki/Time_to_live).
|
Nomad node with a short [TTL](https://en.wikipedia.org/wiki/Time_to_live).
|
||||||
|
|
||||||
|
@ -321,6 +321,6 @@ There are two main components to consider to for external threats in a Nomad clu
|
||||||
|
|
||||||
| **Port / Protocol** | Agents | Description |
|
| **Port / Protocol** | Agents | Description |
|
||||||
|----------------------|---------|-------------|
|
|----------------------|---------|-------------|
|
||||||
| **4646** / TCP | All | [HTTP](https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol) to provide [UI](/guides/web-ui/access.html) and [API](/api-docs) access to agents. |
|
| **4646** / TCP | All | [HTTP](https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol) to provide [UI](https://learn.hashicorp.com/collections/nomad/web-ui) and [API](/api-docs) access to agents. |
|
||||||
| **4647** / TCP | Servers | [RPC](https://en.wikipedia.org/wiki/Remote_procedure_call) protocol used by agents. |
|
| **4647** / TCP | Servers | [RPC](https://en.wikipedia.org/wiki/Remote_procedure_call) protocol used by agents. |
|
||||||
| **4648** / TCP + UDP | Servers | [gossip](/docs/internals/gossip.html) protocol to manage server membership using [Serf](https://www.serf.io/). |
|
| **4648** / TCP + UDP | Servers | [gossip](/docs/internals/gossip.html) protocol to manage server membership using [Serf](https://www.serf.io/). |
|
||||||
|
|
Loading…
Reference in a new issue