2016-04-11 23:46:44 +00:00
---
layout: "docs"
2016-05-29 14:55:06 +00:00
page_title: "Auth Backend: AWS-EC2"
sidebar_current: "docs-auth-aws-ec2"
2016-04-11 23:46:44 +00:00
description: |-
2016-06-01 14:36:58 +00:00
The aws-ec2 backend allows automated authentication of AWS EC2 instances.
2016-04-11 23:46:44 +00:00
---
2016-05-29 14:55:06 +00:00
# Auth Backend: aws-ec2
2016-04-11 23:46:44 +00:00
2016-06-01 14:36:58 +00:00
The aws-ec2 auth backend provides a secure introduction mechanism for AWS EC2
2016-04-28 15:25:47 +00:00
instances, allowing automated retrieval of a Vault token. Unlike most Vault
2016-05-03 16:14:07 +00:00
authentication backends, this backend does not require first-deploying, or
2016-04-13 16:24:15 +00:00
provisioning security-sensitive credentials (tokens, username/password, client
2016-04-13 23:01:06 +00:00
certificates, etc). Instead, it treats AWS as a Trusted Third Party and uses
2016-04-13 16:24:15 +00:00
the cryptographically signed dynamic metadata information that uniquely
represents each EC2 instance.
2016-04-11 23:46:44 +00:00
2016-04-13 16:24:15 +00:00
## Authentication Workflow
2016-04-11 23:46:44 +00:00
2016-04-13 16:24:15 +00:00
EC2 instances have access to metadata describing the instance. (For those not
familiar with instance metadata, details can be found
[here ](http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html ).)
2016-04-11 23:46:44 +00:00
2016-05-03 16:14:07 +00:00
One piece of "dynamic metadata" available to the EC2 instance, is the instance
2016-04-13 16:24:15 +00:00
identity document, a JSON representation of a collection of instance metadata.
Importantly, AWS also provides a copy of this metadata in PKCS#7 format signed
with its public key, and publishes the public keys used (which are grouped by
region). (Details on the instance identity document and the signature can be
found
[here ](http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/instance-identity-documents.html ).)
2016-04-11 23:46:44 +00:00
2016-04-13 16:24:15 +00:00
During login, the backend verifies the signature on the PKCS#7 document,
2016-05-12 11:19:29 +00:00
ensuring that the information contained within, is certified accurate by AWS.
2016-04-13 16:24:15 +00:00
Before succeeding the login attempt and returning a Vault token, the backend
verifies the current running status of the instance via the EC2 API.
2016-04-11 23:46:44 +00:00
2016-04-13 16:24:15 +00:00
There are various modifications to this workflow that provide more or less
security, as detailed later in this documentation.
2016-04-11 23:46:44 +00:00
2016-04-13 16:24:15 +00:00
## Authorization Workflow
2016-04-11 23:46:44 +00:00
2016-06-15 11:32:36 +00:00
The basic mechanism of operation is per-role. Roles are registered in the
backend and associated with various optional restrictions, such as the set
2016-05-03 16:14:07 +00:00
of allowed policies and max TTLs on the generated tokens. Each role can
2016-06-15 11:32:36 +00:00
be specified with the constraints that are to be met during the login. For
2016-09-20 20:11:32 +00:00
example, one such constraint that is supported is to bind against AMI ID. A
role which is bound to a specific AMI, can only be used for login by those
instances that are deployed on the same AMI.
2016-04-13 16:24:15 +00:00
In many cases, an organization will use a "seed AMI" that is specialized after
bootup by configuration management or similar processes. For this reason, an
2016-05-03 16:14:07 +00:00
role entry in the backend can also be associated with a "role tag". These tags
2016-04-13 16:24:15 +00:00
are generated by the backend and are placed as the value of a tag with the
given key on the EC2 instance. The role tag can be used to further restrict the
2016-05-03 16:14:07 +00:00
parameters set on the role, but cannot be used to grant additional privileges.
2016-09-20 20:11:32 +00:00
If a role with an AMI bind constraint has "role tag" enabled on the role, and
2016-05-03 16:14:07 +00:00
the EC2 instance performing login does not have an expected tag on it, or if the
tag on the instance is deleted for some reason, authentication fails.
2016-04-13 16:24:15 +00:00
The role tags can be generated at will by an operator with appropriate API
2016-05-03 16:14:07 +00:00
access. They are HMAC-signed by a per-role key stored within the backend, allowing
2016-04-28 15:25:47 +00:00
the backend to verify the authenticity of a found role tag and ensure that it has
2016-04-13 16:24:15 +00:00
not been tampered with. There is also a mechanism to blacklist role tags if one
has been found to be distributed outside of its intended set of machines.
2016-04-11 23:46:44 +00:00
## Client Nonce
2016-04-13 23:01:06 +00:00
If an unintended party gains access to the PKCS#7 signature of the identity
2016-04-13 16:24:15 +00:00
document (which by default is available to every process and user that gains
access to an EC2 instance), it can impersonate that instance and fetch a Vault
token. The backend addresses this problem by using a Trust On First Use (TOFU)
2016-04-28 15:25:47 +00:00
mechanism that allows the first client to present the PKCS#7 signature of the
document to be authenticated and denying the rest. An important property of
this design is detection of unauthorized access: if an unintended party authenticates,
the intended client will be unable to authenticate and can raise an alert for
2016-04-13 16:24:15 +00:00
investigation.
During the first login, the backend stores the instance ID that authenticated
in a `whitelist` . One method of operation of the backend is to disallow any
2016-05-03 16:14:07 +00:00
authentication attempt for an instance ID contained in the whitelist, using the
2016-05-12 11:19:29 +00:00
'disallow_reauthentication' option on the role, meaning that an instance is
allowed to login only once. However, this has consequences for token rotation,
as it means that once a token has expired, subsequent authentication attempts
would fail. By default, reauthentication is enabled in this backend, and can be
turned off using 'disallow_reauthentication' parameter on the registered role.
2016-04-13 16:24:15 +00:00
2016-09-14 15:17:45 +00:00
In the default method of operation, the backend will return a unique nonce
during the first authentication attempt, as part of auth `metadata` . Clients
should present this `nonce` for subsequent login attempts and it should match
the `nonce` cached at the identity-whitelist entry at the backend. Since only
the original client knows the `nonce` , only the original client is allowed to
reauthenticate. (This is the reason that this is a whitelist rather than a
blacklist; by default, it's keeping track of clients allowed to reauthenticate,
rather than those that are not.). Clients can choose to provide a `nonce` even
for the first login attempt, in which case the provided `nonce` will be tied to
the cached identity-whitelist entry. It is recommended to use a strong `nonce`
value in this case.
2016-04-13 16:24:15 +00:00
It is up to the client to behave correctly with respect to the nonce; if the
client stores the nonce on disk it can survive reboots, but could also give
access to other users or applications on the instance. It is also up to the
operator to ensure that client nonces are in fact unique; sharing nonces allows
a compromise of the nonce value to enable an attacker that gains access to any
EC2 instance to imitate the legitimate client on that instance. This is why
nonces can be disabled on the backend side in favor of only a single
authentication per instance; in some cases, such as when using ASGs, instances
are immutable and single-boot anyways, and in conjunction with a high max TTL,
reauthentication may not be needed (and if it is, the instance can simply be
2016-05-03 16:14:07 +00:00
shut down and allow ASG to start a new one).
2016-04-13 16:24:15 +00:00
In both cases, entries can be removed from the whitelist by instance ID,
allowing reauthentication by a client if the nonce is lost (or not used) and an
operator approves the process.
One other point: if available by the OS/distribution being used with the EC2
instance, it is not a bad idea to firewall access to the signed PKCS#7 metadata
to ensure that it is accessible only to the matching user(s) that require
access.
## Advanced Options and Caveats
### Dynamic Management of Policies Via Role Tags
2016-04-11 23:46:44 +00:00
If the instance is required to have customized set of policies based on the
2016-04-13 16:24:15 +00:00
role it plays, the `role_tag` option can be used to provide a tag to set on
2016-05-03 16:14:07 +00:00
instances, for a given role. When this option is set, during login, along with
2016-04-13 16:24:15 +00:00
verification of PKCS#7 signature and instance health, the backend will query
for the value of a specific tag with the configured key that is attached to the
2016-04-28 15:25:47 +00:00
instance. The tag holds information that represents a *subset* of privileges that
2016-05-03 16:14:07 +00:00
are set on the role and are used to further restrict the set of the role's
2016-04-13 16:24:15 +00:00
privileges for that particular instance.
2016-05-29 14:55:06 +00:00
A `role_tag` can be created using `auth/aws-ec2/role/<role>/tag` endpoint
2016-04-13 16:24:15 +00:00
and is immutable. The information present in the tag is SHA256 hashed and HMAC
2016-05-03 16:14:07 +00:00
protected. The per-role key to HMAC is only maintained in the backend. This prevents
2016-04-28 15:25:47 +00:00
an adversarial operator from modifying the tag when setting it on the EC2 instance
2016-04-13 16:24:15 +00:00
in order to escalate privileges.
2016-05-03 16:14:07 +00:00
When 'role_tag' option is enabled on a role, the instances are required to have a
2016-04-28 15:25:47 +00:00
role tag. If the tag is not found on the EC2 instance, authentication will fail.
This is to ensure that privileges of an instance are never escalated for not
2016-05-03 16:14:07 +00:00
having the tag on it or for getting the tag removed. If the role tag creation does
not specify the policy component, the client will inherit the allowed policies set
on the role. If the role tag creation specifies the policy component but it contains
no policies, the token will contain only the `default` policy; by default, this policy
allows only manipulation (revocation, renewal, lookup) of the existing token, plus
access to its [cubbyhole ](https://www.vaultproject.io/docs/secrets/cubbyhole/index.html ).
2016-04-13 16:24:15 +00:00
This can be useful to allow instances access to a secure "scratch space" for
storing data (via the token's cubbyhole) but without granting any access to
other resources provided by or resident in Vault.
### Handling Lost Client Nonces
If an EC2 instance loses its client nonce (due to a reboot, a stop/start of the
client, etc.), subsequent login attempts will not succeed. If the client nonce
is lost, normally the only option is to delete the entry corresponding to the
instance ID from the identity `whitelist` in the backend. This can be done via
2016-05-29 14:55:06 +00:00
the `auth/aws-ec2/identity-whitelist/<instance_id>` endpoint. This allows a new
2016-04-13 23:01:06 +00:00
client nonce to be accepted by the backend during the next login request.
2016-04-13 16:24:15 +00:00
Under certain circumstances there is another useful setting. When the instance
is placed onto a host upon creation, it is given a `pendingTime` value in the
instance identity document (documentation from AWS does not cover this option,
unfortunately). If an instance is stopped and started, the `pendingTime` value
is updated (this does not apply to reboots, however).
The backend can take advantage of this via the `allow_instance_migration`
2016-05-03 16:14:07 +00:00
option, which is set per-role. When this option is enabled, if the client nonce
2016-04-13 23:01:06 +00:00
does not match the saved nonce, the `pendingTime` value in the instance
2016-04-13 16:24:15 +00:00
identity document will be checked; if it is newer than the stored `pendingTime`
value, the backend assumes that the client was stopped/started and allows the
client to log in successfully, storing the new nonce as the valid nonce for
that client. This essentially re-starts the TOFU mechanism any time the
instance is stopped and started, so should be used with caution. Just like with
initial authentication, the legitimate client should have a way to alert (or an
alert should trigger based on its logs) if it is denied authentication.
Unfortunately, the `allow_instance_migration` only helps during stop/start
actions; the current metadata does not provide for a way to allow this
automatic behavior during reboots. The backend will be updated if this needed
metadata becomes available.
2016-05-03 16:14:07 +00:00
The `allow_instance_migration` option is set per-role, and can also be
2016-04-28 15:43:48 +00:00
specified in a role tag. Since role tags can only restrict behavior, if the
2016-05-03 16:14:07 +00:00
option is set to `false` on the role, a value of `true` in the role tag takes
effect; however, if the option is set to `true` on the role, a value set in the
2016-04-28 15:43:48 +00:00
role tag has no effect.
2016-04-13 16:24:15 +00:00
### Disabling Reauthentication
2016-05-03 16:14:07 +00:00
If in a given organization's architecture, a client fetches a long-lived Vault
2016-04-13 16:24:15 +00:00
token and has no need to rotate the token, all future logins for that instance
ID can be disabled. If the option `disallow_reauthentication` is set, only one
login will be allowed per instance. If the intended client successfully
retrieves a token during login, it can be sure that its token will not be
hijacked by another entity.
When `disallow_reauthentication` option is enabled, the client can choose not
to supply a nonce during login, although it is not an error to do so (the nonce
2016-04-28 15:25:47 +00:00
is simply ignored). Note that reauthentication is enabled by default. If only
2016-05-12 11:19:29 +00:00
a single login is desired, `disallow_reauthentication` should be set explicitly
2016-05-03 16:14:07 +00:00
on the role or on the role tag.
2016-04-13 16:24:15 +00:00
2016-05-03 16:14:07 +00:00
The `disallow_reauthentication` option is set per-role, and can also be
2016-04-13 16:24:15 +00:00
specified in a role tag. Since role tags can only restrict behavior, if the
2016-05-03 16:14:07 +00:00
option is set to `false` on the role, a value of `true` in the role tag takes
effect; however, if the option is set to `true` on the role, a value set in the
2016-04-13 16:24:15 +00:00
role tag has no effect.
### Blacklisting Role Tags
2016-05-12 11:19:29 +00:00
Role tags are tied to a specific role, but the backend has no control over, which
instances using that role, should have any particular role tag; that is purely up
2016-05-03 16:14:07 +00:00
to the operator. Although role tags are only restrictive (a tag cannot escalate
privileges above what is set on its role), if a role tag is found to have been
used incorrectly, and the administrator wants to ensure that the role tag has no
further effect, the role tag can be placed on a `blacklist` via the endpoint
2016-05-29 14:55:06 +00:00
`auth/aws-ec2/roletag-blacklist/<role_tag>` . Note that this will not invalidate the
2016-05-12 11:19:29 +00:00
tokens that were already issued; this only blocks any further login requests from
those instances that have the blacklisted tag attached to them.
2016-04-13 16:24:15 +00:00
### Expiration Times and Tidying of `blacklist` and `whitelist` Entries
2016-04-28 15:25:47 +00:00
The expired entries in both identity `whitelist` and role tag `blacklist` are
deleted automatically. The entries in both of these lists contain an expiration
2016-05-03 16:14:07 +00:00
time which is dynamically determined by three factors: `max_ttl` set on the role,
2016-04-28 15:25:47 +00:00
`max_ttl` set on the role tag, and `max_ttl` value of the backend mount. The
least of these three dictates the maximum TTL of the issued token, and
correspondingly will be set as the expiration times of these entries.
2016-04-13 16:24:15 +00:00
2016-05-12 11:19:29 +00:00
The endpoints `aws/auth/tidy/identity-whitelist` and `aws/auth/tidy/roletag-blacklist` are
2016-05-03 16:14:07 +00:00
provided to clean up the entries present in these lists. These endpoints allow
defining a safety buffer, such that an entry must not only be expired, but be
past expiration by the amount of time dictated by the safety buffer in order
to actually remove the entry.
2016-04-13 16:24:15 +00:00
2016-05-03 16:14:07 +00:00
Automatic deletion of expired entries is performed by the periodic function
2016-04-28 15:25:47 +00:00
of the backend. This function does the tidying of both blacklist role tags
and whitelist identities. Periodic tidying is activated by default and will
have a safety buffer of 72 hours, meaning only those entries are deleted which
were expired before 72 hours from when the tidy operation is being performed.
2016-05-12 11:19:29 +00:00
This can be configured via `config/tidy/roletag-blacklist` and `config/tidy/identity-whitelist`
2016-04-19 18:21:27 +00:00
endpoints.
2016-04-13 16:24:15 +00:00
### Varying Public Certificates
2016-07-13 22:11:01 +00:00
The AWS public certificate, which contains the public key used to verify the
PKCS#7 signature, varies for different AWS regions. The primary AWS public
certificate, which covers most AWS regions, is already included in Vault and
does not need to be added. Instances whose PKCS#7 signatures cannot be
verified by the default public certificate included in Vault can register a
2016-04-14 14:41:49 +00:00
different public certificate which can be found [here]
(http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/instance-identity-documents.html),
2016-05-29 14:55:06 +00:00
via the `auth/aws-ec2/config/certificate/<cert_name>` endpoint.
2016-04-11 23:46:44 +00:00
2016-04-28 15:25:47 +00:00
### Dangling Tokens
2016-05-03 16:14:07 +00:00
An EC2 instance, after authenticating itself with the backend gets a Vault token.
2016-04-28 15:25:47 +00:00
After that, if the instance terminates or goes down for any reason, the backend
will not be aware of such events. The token issued will still be valid, until
it expires. The token will likely be expired sooner than its lifetime when the
instance fails to renew the token on time.
2016-04-11 23:46:44 +00:00
## Authentication
### Via the CLI
#### Enable AWS EC2 authentication in Vault.
```
2016-06-10 06:08:08 +00:00
$ vault auth-enable aws-ec2
2016-04-11 23:46:44 +00:00
```
2016-04-13 16:24:15 +00:00
#### Configure the credentials required to make AWS API calls
2016-09-28 22:30:32 +00:00
If not specified, Vault will attempt to use standard environment variables
(`AWS_ACCESS_KEY_ID` and `AWS_SECRET_ACCESS_KEY` ) or IAM EC2 instance role
credentials if available.
The IAM account or role to which the credentials map must allow the
`ec2:DescribeInstances` action. In addition, if IAM Role binding is used (see
`bound_iam_role_arn` below), `iam:GetInstanceProfile` must also be allowed.
2016-04-11 23:46:44 +00:00
```
2016-05-29 14:55:06 +00:00
$ vault write auth/aws-ec2/config/client secret_key=vCtSM8ZUEQ3mOFVlYPBQkf2sO6F/W7a5TVzrl3Oj access_key=VKIAJBRHKH6EVTTNXDHA
2016-04-11 23:46:44 +00:00
```
2016-05-03 16:14:07 +00:00
#### Configure the policies on the role.
2016-04-11 23:46:44 +00:00
```
2016-05-29 14:55:06 +00:00
$ vault write auth/aws-ec2/role/dev-role bound_ami_id=ami-fce3c696 policies=prod,dev max_ttl=500h
2016-04-11 23:46:44 +00:00
```
#### Perform the login operation
```
2016-09-14 15:17:45 +00:00
$ vault write auth/aws-ec2/login role=dev-role
pkcs7=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 nonce=5defbf9e-a8f9-3063-bdfc-54b7a42a1f95
2016-04-11 23:46:44 +00:00
```
### Via the API
#### Enable AWS EC2 authentication in Vault.
```
curl -X POST -H "x-vault-token:123" "http://127.0.0.1:8200/v1/sys/auth/aws" -d '{"type":"aws"}'
```
#### Configure the credentials required to make AWS API calls.
```
2016-05-29 14:55:06 +00:00
curl -X POST -H "x-vault-token:123" "http://127.0.0.1:8200/v1/auth/aws-ec2/config/client" -d '{"access_key":"VKIAJBRHKH6EVTTNXDHA", "secret_key":"vCtSM8ZUEQ3mOFVlYPBQkf2sO6F/W7a5TVzrl3Oj"}'
2016-04-11 23:46:44 +00:00
```
2016-05-03 16:14:07 +00:00
#### Configure the policies on the role.
2016-04-11 23:46:44 +00:00
```
2016-05-29 14:55:06 +00:00
curl -X POST -H "x-vault-token:123" "http://127.0.0.1:8200/v1/auth/aws-ec2/role/dev-role -d '{"bound_ami_id":"ami-fce3c696","policies":"prod,dev","max_ttl":"500h"}'
2016-04-11 23:46:44 +00:00
```
#### Perform the login operation
```
2016-09-14 15:17:45 +00:00
curl -X POST "http://127.0.0.1:8200/v1/auth/aws-ec2/login" -d
2016-09-19 21:11:16 +00:00
'{"role":"dev-role","pkcs7":"'$(curl -s
http://169.254.169.254/latest/dynamic/instance-identity/pkcs7 | tr -d '\n')'","nonce":"5defbf9e-a8f9-3063-bdfc-54b7a42a1f95"}'
2016-04-11 23:46:44 +00:00
```
The response will be in JSON. For example:
```javascript
{
"auth": {
"renewable": true,
2016-09-14 15:17:45 +00:00
"lease_duration": 72000,
2016-04-11 23:46:44 +00:00
"metadata": {
2016-09-14 15:17:45 +00:00
"role_tag_max_ttl": "0s",
"role": "ami-f083709d",
"region": "us-east-1",
"nonce": "5defbf9e-a8f9-3063-bdfc-54b7a42a1f95",
"instance_id": "i-a832f734",
"ami_id": "ami-f083709d"
2016-04-11 23:46:44 +00:00
},
"policies": [
"default",
"dev",
"prod"
],
2016-09-14 15:17:45 +00:00
"accessor": "5cd96cd1-58b7-2904-5519-75ddf957ec06",
"client_token": "150fc858-2402-49c9-56a5-f4b57f2c8ff1"
2016-04-11 23:46:44 +00:00
},
"warnings": null,
2016-09-14 15:17:45 +00:00
"wrap_info": null,
2016-04-11 23:46:44 +00:00
"data": null,
"lease_duration": 0,
"renewable": false,
2016-09-14 15:17:45 +00:00
"lease_id": "",
"request_id": "d7d50c06-56b8-37f4-606c-ccdc87a1ee4c"
2016-04-11 23:46:44 +00:00
}
```
## API
2016-05-29 14:55:06 +00:00
### /auth/aws-ec2/config/client
2016-04-11 23:46:44 +00:00
#### POST
< dl class = "api" >
< dt > Description< / dt >
< dd >
Configures the credentials required to perform API calls to AWS.
The instance identity document fetched from the PKCS#7 signature
will provide the EC2 instance ID. The credentials configured using
this endpoint will be used to query the status of the instances via
2016-05-12 11:19:29 +00:00
DescribeInstances API. If static credentials are not provided using
this endpoint, then the credentials will be retrieved from the
environment variables `AWS_ACCESS_KEY` , `AWS_SECRET_KEY` and `AWS_REGION`
respectively. If the credentials are still not found and if the
backend is configured on an EC2 instance with metadata querying
capabilities, the credentials are fetched automatically.
2016-04-11 23:46:44 +00:00
< / dd >
< dt > Method< / dt >
< dd > POST< / dd >
< dt > URL< / dt >
2016-05-29 14:55:06 +00:00
< dd > `/auth/aws-ec2/config/client`< / dd >
2016-04-11 23:46:44 +00:00
< dt > Parameters< / dt >
< dd >
< ul >
< li >
< span class = "param" > access_key< / span >
< span class = "param-flags" > required< / span >
2016-05-12 11:19:29 +00:00
AWS Access key with permissions to query EC2 DescribeInstances API.
2016-04-11 23:46:44 +00:00
< / li >
< / ul >
< ul >
< li >
< span class = "param" > secret_key< / span >
< span class = "param-flags" > required< / span >
2016-05-12 11:19:29 +00:00
AWS Secret key with permissions to query EC2 DescribeInstances API.
2016-04-11 23:46:44 +00:00
< / li >
< / ul >
2016-05-02 21:21:52 +00:00
< ul >
< li >
< span class = "param" > endpoint< / span >
< span class = "param-flags" > optional< / span >
URL to override the default generated endpoint for making AWS EC2 API calls.
< / li >
< / ul >
2016-04-11 23:46:44 +00:00
< / dd >
< dt > Returns< / dt >
< dd > `204` response code.
< / dd >
< / dl >
#### GET
< dl class = "api" >
< dt > Description< / dt >
Returns the previously configured AWS access credentials.
< dd >
2016-06-14 16:58:50 +00:00
2016-04-11 23:46:44 +00:00
< / dd >
< dt > Method< / dt >
< dd > GET< / dd >
< dt > URL< / dt >
2016-05-29 14:55:06 +00:00
< dd > `/auth/aws-ec2/config/client`< / dd >
2016-04-11 23:46:44 +00:00
< dt > Parameters< / dt >
< dd >
None.
< / dd >
< dt > Returns< / dt >
< dd >
```
{
"auth": null,
"warnings": null,
"data": {
"secret_key": "vCtSM8ZUEQ3mOFVlYPBQkf2sO6F/W7a5TVzrl3Oj",
"access_key": "VKIAJBRHKH6EVTTNXDHA"
2016-05-02 21:21:52 +00:00
"endpoint" "",
2016-04-11 23:46:44 +00:00
},
"lease_duration": 0,
"renewable": false,
"lease_id": ""
}
```
< / dd >
< / dl >
#### DELETE
< dl class = "api" >
< dt > Description< / dt >
< dd >
Deletes the previously configured AWS access credentials.
< / dd >
< dt > Method< / dt >
< dd > DELETE< / dd >
< dt > URL< / dt >
2016-05-29 14:55:06 +00:00
< dd > `/auth/aws-ec2/config/client`< / dd >
2016-04-11 23:46:44 +00:00
< dt > Parameters< / dt >
< dd >
None.
< / dd >
< dt > Returns< / dt >
< dd > `204` response code.
< / dd >
< / dl >
2016-05-29 14:55:06 +00:00
### /auth/aws-ec2/config/certificate/<cert_name>
2016-04-11 23:46:44 +00:00
#### POST
< dl class = "api" >
< dt > Description< / dt >
< dd >
Registers an AWS public key that is used to verify the PKCS#7 signature of the
EC2 instance metadata.
< / dd >
< dt > Method< / dt >
< dd > POST< / dd >
< dt > URL< / dt >
2016-05-29 14:55:06 +00:00
< dd > `/auth/aws-ec2/config/certificate/< cert_name > `< / dd >
2016-04-11 23:46:44 +00:00
< dt > Parameters< / dt >
< dd >
< ul >
< li >
2016-04-14 14:41:49 +00:00
< span class = "param" > cert_name< / span >
< span class = "param-flags" > required< / span >
Name of the certificate.
< / li >
< / ul >
< ul >
< li >
< span class = "param" > aws_public_cert< / span >
2016-04-11 23:46:44 +00:00
< span class = "param-flags" > required< / span >
AWS Public key required to verify PKCS7 signature of the EC2 instance metadata.
< / li >
< / ul >
< / dd >
< dt > Returns< / dt >
< dd > `204` response code.
< / dd >
< / dl >
#### GET
< dl class = "api" >
< dt > Description< / dt >
< dd >
Returns the previously configured AWS public key.
< / dd >
< dt > Method< / dt >
< dd > GET< / dd >
< dt > URL< / dt >
2016-05-29 14:55:06 +00:00
< dd > `/auth/aws-ec2/config/certificate/< cert_name > `< / dd >
2016-04-11 23:46:44 +00:00
< dt > Parameters< / dt >
< dd >
None.
< / dd >
< dt > Returns< / dt >
< dd >
```javascript
{
"auth": null,
"warnings": null,
"data": {
"aws_public_cert": "-----BEGIN CERTIFICATE-----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\n7HX32MxXYruse9ACFBNGmdX2ZBrVNGrN9N2f6ROk0k9K\n-----END CERTIFICATE-----\n"
},
"lease_duration": 0,
"renewable": false,
"lease_id": ""
}
```
< / dd >
< / dl >
2016-04-14 14:41:49 +00:00
#### LIST
< dl class = "api" >
< dt > Description< / dt >
< dd >
Lists all the AWS public certificates that are registered with the backend.
< / dd >
< dt > Method< / dt >
< dd > GET< / dd >
< dt > URL< / dt >
2016-05-29 14:55:06 +00:00
< dd > `/auth/aws-ec2/config/certificates?list=true`< / dd >
2016-04-14 14:41:49 +00:00
< dt > Parameters< / dt >
< dd >
None.
< / dd >
< dt > Returns< / dt >
< dd >
```javascript
{
"auth": null,
"warnings": null,
"data": {
"keys": [
"cert1"
]
},
"lease_duration": 0,
"renewable": false,
"lease_id": ""
}
```
< / dd >
< / dl >
2016-05-29 14:55:06 +00:00
### /auth/aws-ec2/config/tidy/identity-whitelist
2016-04-19 18:21:27 +00:00
##### POST
< dl class = "api" >
< dt > Description< / dt >
< dd >
Configures the periodic tidying operation of the whitelisted identity entries.
< / dd >
< dt > Method< / dt >
< dd > POST< / dd >
< dt > URL< / dt >
2016-05-29 14:55:06 +00:00
< dd > `/auth/aws-ec2/config/tidy/identity-whitelist`< / dd >
2016-04-19 18:21:27 +00:00
< dt > Parameters< / dt >
< dd >
< ul >
< li >
< span class = "param" > safety_buffer< / span >
< span class = "param-flags" > optional< / span >
The amount of extra time that must have passed beyond the `roletag` expiration,
before it is removed from the backend storage. Defaults to 72h.
< / li >
< / ul >
< ul >
< li >
< span class = "param" > disable_periodic_tidy< / span >
< span class = "param-flags" > optional< / span >
2016-05-12 11:19:29 +00:00
If set to 'true', disables the periodic tidying of the 'identity-whitelist/< instance_id > '
entries.
2016-04-19 18:21:27 +00:00
< / li >
< / ul >
< / dd >
< dt > Returns< / dt >
< dd > `204` response code.
< / dd >
< / dl >
#### GET
< dl class = "api" >
< dt > Description< / dt >
< dd >
Returns the previously configured periodic whitelist tidying settings.
< / dd >
< dt > Method< / dt >
< dd > GET< / dd >
< dt > URL< / dt >
2016-05-29 14:55:06 +00:00
< dd > `/auth/aws-ec2/config/tidy/identity-whitelist`< / dd >
2016-04-19 18:21:27 +00:00
< dt > Parameters< / dt >
< dd >
None.
< / dd >
< dt > Returns< / dt >
< dd >
```javascript
{
"auth": null,
"warnings": null,
"data": {
"safety_buffer": 60,
"disable_periodic_tidy": false
},
"lease_duration": 0,
"renewable": false,
"lease_id": ""
}
```
< / dd >
< / dl >
#### DELETE
< dl class = "api" >
< dt > Description< / dt >
< dd >
Deletes the previously configured periodic whitelist tidying settings.
< / dd >
< dt > Method< / dt >
< dd > DELETE< / dd >
< dt > URL< / dt >
2016-05-29 14:55:06 +00:00
< dd > `/auth/aws-ec2/config/tidy/identity-whitelist`< / dd >
2016-04-19 18:21:27 +00:00
< dt > Parameters< / dt >
< dd >
None.
< / dd >
< dt > Returns< / dt >
< dd > `204` response code.
< / dd >
< / dl >
2016-05-29 14:55:06 +00:00
### /auth/aws-ec2/config/tidy/roletag-blacklist
2016-04-19 18:21:27 +00:00
##### POST
< dl class = "api" >
< dt > Description< / dt >
< dd >
Configures the periodic tidying operation of the blacklisted role tag entries.
< / dd >
< dt > Method< / dt >
< dd > POST< / dd >
< dt > URL< / dt >
2016-05-29 14:55:06 +00:00
< dd > `/auth/aws-ec2/config/tidy/roletag-blacklist`< / dd >
2016-04-19 18:21:27 +00:00
< dt > Parameters< / dt >
< dd >
< ul >
< li >
< span class = "param" > safety_buffer< / span >
< span class = "param-flags" > optional< / span >
The amount of extra time that must have passed beyond the `roletag` expiration, before it is removed from the backend storage. Defaults to 72h.
< / li >
< / ul >
< ul >
< li >
< span class = "param" > disable_periodic_tidy< / span >
< span class = "param-flags" > optional< / span >
2016-05-12 11:19:29 +00:00
If set to 'true', disables the periodic tidying of the 'roletag-blacklist/< role_tag > ' entries.
2016-04-19 18:21:27 +00:00
< / li >
< / ul >
< / dd >
< dt > Returns< / dt >
< dd > `204` response code.
< / dd >
< / dl >
#### GET
< dl class = "api" >
< dt > Description< / dt >
< dd >
Returns the previously configured periodic blacklist tidying settings.
< / dd >
< dt > Method< / dt >
< dd > GET< / dd >
< dt > URL< / dt >
2016-05-29 14:55:06 +00:00
< dd > `/auth/aws-ec2/config/tidy/roletag-blacklist`< / dd >
2016-04-19 18:21:27 +00:00
< dt > Parameters< / dt >
< dd >
None.
< / dd >
< dt > Returns< / dt >
< dd >
```javascript
{
"auth": null,
"warnings": null,
"data": {
"safety_buffer": 60,
"disable_periodic_tidy": false
},
"lease_duration": 0,
"renewable": false,
"lease_id": ""
}
```
< / dd >
< / dl >
#### DELETE
< dl class = "api" >
< dt > Description< / dt >
< dd >
Deletes the previously configured periodic blacklist tidying settings.
< / dd >
< dt > Method< / dt >
< dd > DELETE< / dd >
< dt > URL< / dt >
2016-05-29 14:55:06 +00:00
< dd > `/auth/aws-ec2/config/tidy/roletag-blacklist`< / dd >
2016-04-19 18:21:27 +00:00
< dt > Parameters< / dt >
< dd >
None.
< / dd >
< dt > Returns< / dt >
< dd > `204` response code.
< / dd >
< / dl >
2016-04-11 23:46:44 +00:00
2016-08-30 15:53:21 +00:00
### /auth/aws-ec2/role/[role]
2016-04-11 23:46:44 +00:00
#### POST
< dl class = "api" >
< dt > Description< / dt >
< dd >
2016-06-14 15:58:19 +00:00
Registers a role in the backend. Only those instances which are using
the role registered using this endpoint, will be able to perform the login
operation. Contraints can be specified on the role, that are applied on the
instances attempting to login. At least one constraint should be specified
on the role.
2016-04-11 23:46:44 +00:00
< / dd >
< dt > Method< / dt >
< dd > POST< / dd >
< dt > URL< / dt >
2016-05-29 14:55:06 +00:00
< dd > `/auth/aws-ec2/role/< role > `< / dd >
2016-04-11 23:46:44 +00:00
< dt > Parameters< / dt >
< dd >
< ul >
< li >
2016-05-13 18:31:13 +00:00
< span class = "param" > role< / span >
2016-04-11 23:46:44 +00:00
< span class = "param-flags" > required< / span >
2016-05-03 16:14:07 +00:00
Name of the role.
< / li >
< / ul >
< ul >
< li >
< span class = "param" > bound_ami_id< / span >
2016-06-14 15:58:19 +00:00
< span class = "param-flags" > optional< / span >
If set, defines a constraint on the EC2 instances that they
should be using the AMI ID specified by this parameter.
< / li >
< / ul >
< ul >
< li >
< span class = "param" > bound_account_id< / span >
< span class = "param-flags" > optional< / span >
If set, defines a constraint on the EC2 instances that the account ID
in its identity document to match the one specified by this parameter.
2016-04-14 14:41:49 +00:00
< / li >
2016-09-26 13:37:38 +00:00
< / ul >
< ul >
< li >
< span class = "param" > bound_iam_role_arn< / span >
< span class = "param-flags" > optional< / span >
2016-09-28 22:30:32 +00:00
If set, defines a constraint on the authenticating EC2 instance that it
must match the IAM role ARN specified by this parameter. The value is
prefix-matched (as though it were a glob ending in `*` ). The configured
IAM user or EC2 instance role must be allowed to execute the
`iam:GetInstanceProfile` action if this is specified.
2016-09-26 13:37:38 +00:00
< / li >
< / ul >
2016-09-28 22:30:49 +00:00
< ul >
2016-06-14 16:58:50 +00:00
< li >
2016-09-23 15:23:59 +00:00
< span class = "param" > bound_iam_instance_profile_arn< / span >
2016-06-14 16:58:50 +00:00
< span class = "param-flags" > optional< / span >
2016-09-28 22:08:28 +00:00
If set, defines a constraint on the EC2 instances to be associated with an IAM
instance profile ARN which has a prefix that matches the value specified by
2016-09-28 22:30:32 +00:00
this parameter. The value is prefix-matched (as though it were a glob ending
in `*` ).
2016-06-14 16:58:50 +00:00
< / li >
2016-04-14 14:41:49 +00:00
< / ul >
2016-04-11 23:46:44 +00:00
< ul >
< li >
< span class = "param" > role_tag< / span >
< span class = "param-flags" > optional< / span >
2016-05-12 11:19:29 +00:00
If set, enables the role tags for this role. The value set for this
field should be the 'key' of the tag on the EC2 instance. The 'value'
2016-05-13 18:31:13 +00:00
of the tag should be generated using 'role/< role > /tag' endpoint.
2016-05-12 11:19:29 +00:00
Defaults to an empty string, meaning that role tags are disabled.
2016-04-11 23:46:44 +00:00
< / li >
< / ul >
2016-08-23 20:07:57 +00:00
< ul >
< li >
< span class = "param" > ttl< / span >
< span class = "param-flags" > optional< / span >
The TTL period of tokens issued using this role, provided as "1h", where hour is
the largest suffix.
< / li >
< / ul >
2016-04-11 23:46:44 +00:00
< ul >
< li >
< span class = "param" > max_ttl< / span >
< span class = "param-flags" > optional< / span >
2016-05-12 11:19:29 +00:00
The maximum allowed lifetime of tokens issued using this role.
2016-04-11 23:46:44 +00:00
< / li >
< / ul >
< ul >
< li >
< span class = "param" > policies< / span >
< span class = "param-flags" > optional< / span >
2016-05-12 11:19:29 +00:00
Policies to be set on tokens issued using this role.
2016-04-11 23:46:44 +00:00
< / li >
< / ul >
< ul >
< li >
< span class = "param" > allow_instance_migration< / span >
< span class = "param-flags" > optional< / span >
If set, allows migration of the underlying instance where the client resides. This keys off of pendingTime in the metadata document, so essentially, this disables the client nonce check whenever the instance is migrated to a new host and pendingTime is newer than the previously-remembered time. Use with caution.
< / li >
< / ul >
< ul >
< li >
< span class = "param" > disallow_reauthentication< / span >
< span class = "param-flags" > optional< / span >
2016-05-29 14:55:06 +00:00
If set, only allows a single token to be granted per instance ID. In order to perform a fresh login, the entry in whitelist for the instance ID needs to be cleared using 'auth/aws-ec2/identity-whitelist/< instance_id > ' endpoint. Defaults to 'false'.
2016-04-11 23:46:44 +00:00
< / li >
< / ul >
< / dd >
< dt > Returns< / dt >
< dd > `204` response code.
< / dd >
< / dl >
#### GET
< dl class = "api" >
< dt > Description< / dt >
< dd >
2016-05-03 16:14:07 +00:00
Returns the previously registered role configuration.
2016-04-11 23:46:44 +00:00
< / dd >
< dt > Method< / dt >
< dd > GET< / dd >
< dt > URL< / dt >
2016-05-29 14:55:06 +00:00
< dd > `/auth/aws-ec2/role/< role > `< / dd >
2016-04-11 23:46:44 +00:00
< dt > Parameters< / dt >
< dd >
None.
< / dd >
< dt > Returns< / dt >
< dd >
```javascript
{
"auth": null,
"warnings": null,
"data": {
2016-05-03 16:14:07 +00:00
"bound_ami_id": "ami-fce36987",
2016-04-11 23:46:44 +00:00
"role_tag": "",
"policies": [
"default",
"dev",
"prod"
],
"max_ttl": 1800000,
"disallow_reauthentication": false,
"allow_instance_migration": false
},
"lease_duration": 0,
"renewable": false,
"lease_id": ""
}
```
< / dd >
< / dl >
#### LIST
< dl class = "api" >
< dt > Description< / dt >
< dd >
2016-05-03 16:14:07 +00:00
Lists all the roles that are registered with the backend.
2016-04-11 23:46:44 +00:00
< / dd >
< dt > Method< / dt >
< dd > GET< / dd >
< dt > URL< / dt >
2016-05-29 14:55:06 +00:00
< dd > `/auth/aws-ec2/roles?list=true`< / dd >
2016-04-11 23:46:44 +00:00
< dt > Parameters< / dt >
< dd >
None.
< / dd >
< dt > Returns< / dt >
< dd >
```javascript
{
"auth": null,
"warnings": null,
"data": {
"keys": [
2016-05-03 16:14:07 +00:00
"dev-role",
"prod-role"
2016-04-11 23:46:44 +00:00
]
},
"lease_duration": 0,
"renewable": false,
"lease_id": ""
}
```
< / dd >
< / dl >
#### DELETE
< dl class = "api" >
< dt > Description< / dt >
< dd >
2016-05-12 11:19:29 +00:00
Deletes the previously registered role.
2016-04-11 23:46:44 +00:00
< / dd >
< dt > Method< / dt >
< dd > DELETE< / dd >
< dt > URL< / dt >
2016-05-29 14:55:06 +00:00
< dd > `/auth/aws-ec2/role/< role > `< / dd >
2016-04-11 23:46:44 +00:00
< dt > Parameters< / dt >
< dd >
None.
< / dd >
< dt > Returns< / dt >
< dd > `204` response code.
< / dd >
< / dl >
2016-08-30 15:53:21 +00:00
### /auth/aws-ec2/role/[role]/tag
2016-04-11 23:46:44 +00:00
#### POST
< dl class = "api" >
< dt > Description< / dt >
< dd >
2016-09-14 19:13:54 +00:00
Creates a role tag on the role, which help in restricting the capabilities that
are set on the role. Role tags are not tied to any specific ec2 instance unless
2016-09-14 20:06:38 +00:00
specified explicitly using the `instance_id` parameter. By default, role tags
are designed to be used across all instances that satisfies the constraints on
the role. Regardless of which instances have role tags on them, capabilities
defined in a role tag must be a strict subset of the given role's capabilities.
Note that, since adding and removing a tag is often a widely distributed
privilege, care needs to be taken to ensure that the instances are attached
with correct tags to not let them gain more privileges than what were intended.
If a role tag is changed, the capabilities inherited by the instance will be
those defined on the new role tag. Since those must be a subset of the role
capabilities, the role should never provide more capabilities than any given
instance can be allowed to gain in a worst-case scenario.
2016-04-11 23:46:44 +00:00
< / dd >
< dt > Method< / dt >
< dd > POST< / dd >
< dt > URL< / dt >
2016-05-29 14:55:06 +00:00
< dd > `/auth/aws-ec2/role/< role > /tag`< / dd >
2016-04-11 23:46:44 +00:00
< dt > Parameters< / dt >
< dd >
< ul >
< li >
2016-05-13 18:31:13 +00:00
< span class = "param" > role< / span >
2016-04-11 23:46:44 +00:00
< span class = "param-flags" > required< / span >
2016-05-03 16:14:07 +00:00
Name of the role.
2016-04-11 23:46:44 +00:00
< / li >
< / ul >
< ul >
< li >
< span class = "param" > policies< / span >
< span class = "param-flags" > optional< / span >
2016-05-12 11:19:29 +00:00
Policies to be associated with the tag. If set, must be a subset of
the role's policies. If set, but set to an empty value, only the
'default' policy will be given to issued tokens.
2016-04-11 23:46:44 +00:00
< / li >
< / ul >
< ul >
< li >
< span class = "param" > max_ttl< / span >
< span class = "param-flags" > optional< / span >
2016-05-12 11:19:29 +00:00
If set, specifies the maximum allowed token lifetime.
< / li >
< / ul >
< ul >
< li >
< span class = "param" > instance_id< / span >
< span class = "param-flags" > optional< / span >
Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
2016-04-11 23:46:44 +00:00
< / li >
< / ul >
< ul >
< li >
< span class = "param" > disallow_reauthentication< / span >
< span class = "param-flags" > optional< / span >
2016-05-29 14:55:06 +00:00
If set, only allows a single token to be granted per instance ID. This can be cleared with the auth/aws-ec2/identity-whitelist endpoint. Defaults to 'false'.
2016-04-11 23:46:44 +00:00
< / li >
< / ul >
2016-04-28 15:43:48 +00:00
< ul >
< li >
< span class = "param" > allow_instance_migration< / span >
< span class = "param-flags" > optional< / span >
If set, allows migration of the underlying instance where the client resides. This keys off of pendingTime in the metadata document, so essentially, this disables the client nonce check whenever the instance is migrated to a new host and pendingTime is newer than the previously-remembered time. Use with caution. Defaults to 'false'.
< / li >
< / ul >
2016-04-11 23:46:44 +00:00
< / dd >
< dt > Returns< / dt >
< dd >
```javascript
{
"auth": null,
"warnings": null,
"data": {
2016-05-03 16:14:07 +00:00
"tag_value": "v1:09Vp0qGuyB8=:r=dev-role:p=default,prod:d=false:t=300h0m0s:uPLKCQxqsefRhrp1qmVa1wsQVUXXJG8UZP/pJIdVyOI=",
2016-04-11 23:46:44 +00:00
"tag_key": "VaultRole"
},
"lease_duration": 0,
"renewable": false,
"lease_id": ""
}
```
< / dd >
< / dl >
2016-05-29 14:55:06 +00:00
### /auth/aws-ec2/login
2016-04-11 23:46:44 +00:00
#### POST
< dl class = "api" >
< dt > Description< / dt >
< dd >
2016-05-03 16:14:07 +00:00
Fetch a token. This endpoint verifies the pkcs#7 signature of the instance identity document.
Verifies that the instance is actually in a running state. Cross checks the constraints defined
on the role with which the login is being performed.
2016-04-11 23:46:44 +00:00
< / dd >
< dt > Method< / dt >
< dd > POST< / dd >
< dt > URL< / dt >
2016-05-29 14:55:06 +00:00
< dd > `/auth/aws-ec2/login`< / dd >
2016-04-11 23:46:44 +00:00
< dt > Parameters< / dt >
< dd >
2016-05-03 16:14:07 +00:00
< ul >
< li >
2016-05-13 18:31:13 +00:00
< span class = "param" > role< / span >
2016-05-03 16:14:07 +00:00
< span class = "param-flags" > optional< / span >
Name of the role against which the login is being attempted.
2016-05-13 18:31:13 +00:00
If `role` is not specified, then the login endpoint looks for a role
2016-05-12 11:19:29 +00:00
bearing the name of the AMI ID of the EC2 instance that is trying to login.
If a matching role is not found, login fails.
2016-05-03 16:14:07 +00:00
< / li >
< / ul >
2016-04-11 23:46:44 +00:00
< ul >
< li >
< span class = "param" > pkcs7< / span >
< span class = "param-flags" > required< / span >
2016-07-05 20:21:56 +00:00
PKCS7 signature of the identity document with all `\n` characters removed.
2016-04-11 23:46:44 +00:00
< / li >
< / ul >
< ul >
< li >
< span class = "param" > nonce< / span >
2016-09-14 15:17:45 +00:00
< span class = "param-flags" > optional< / span >
2016-09-14 23:31:09 +00:00
The nonce to be used for subsequent login requests. If this parameter is not
specified at all and if reauthentication is allowed, then the backend will
generate a random nonce, attaches it to the instance's identity-whitelist entry
and returns the nonce back as part of auth metadata. This value should be used
with further login requests, to establish client authenticity. Clients can
choose to set a custom nonce if preferred, in which case, it is recommended
that clients provide a strong nonce. If a nonce is provided but with an empty
value, it indicates intent to disable reauthentication. Note that, when
`disallow_reauthentication` option is enabled on either the role or the role
tag, the `nonce` holds no significance.
2016-04-11 23:46:44 +00:00
< / li >
< / ul >
< / dd >
< dt > Returns< / dt >
< dd >
```javascript
{
"auth": {
"renewable": true,
"lease_duration": 1800000,
"metadata": {
"role_tag_max_ttl": "0",
"instance_id": "i-de0f1344"
2016-05-03 16:14:07 +00:00
"ami_id": "ami-fce36983"
2016-05-13 18:31:13 +00:00
"role": "dev-role"
2016-04-11 23:46:44 +00:00
},
"policies": [
"default",
"dev",
],
"accessor": "20b89871-e6f2-1160-fb29-31c2f6d4645e",
"client_token": "c9368254-3f21-aded-8a6f-7c818e81b17a"
},
"warnings": null,
"data": null,
"lease_duration": 0,
"renewable": false,
"lease_id": ""
}
```
< / dd >
< / dl >
2016-05-29 14:55:06 +00:00
### /auth/aws-ec2/roletag-blacklist/<role_tag>
2016-04-11 23:46:44 +00:00
#### POST
< dl class = "api" >
< dt > Description< / dt >
< dd >
2016-05-12 11:19:29 +00:00
Places a valid role tag in a blacklist. This ensures that the role tag
2016-04-11 23:46:44 +00:00
cannot be used by any instance to perform a login operation again.
2016-06-15 11:32:36 +00:00
Note that if the role tag was previously used to perform a successful
2016-05-12 11:19:29 +00:00
login, placing the tag in the blacklist does not invalidate the
2016-04-11 23:46:44 +00:00
already issued token.
< / dd >
< dt > Method< / dt >
< dd > POST< / dd >
< dt > URL< / dt >
2016-05-29 14:55:06 +00:00
< dd > `/auth/aws-ec2/roletag-blacklist/< role_tag > `< / dd >
2016-04-11 23:46:44 +00:00
< dt > Parameters< / dt >
< dd >
< ul >
< li >
< span class = "param" > role_tag< / span >
< span class = "param-flags" > required< / span >
2016-05-12 11:19:29 +00:00
Role tag to be blacklisted. The tag can be supplied as-is. In order
to avoid any encoding problems, it can be base64 encoded.
2016-04-11 23:46:44 +00:00
< / li >
< / ul >
< / dd >
< dt > Returns< / dt >
< dd > `204` response code.
< / dd >
< / dl >
#### GET
< dl class = "api" >
< dt > Description< / dt >
< dd >
2016-05-12 11:19:29 +00:00
Returns the blacklist entry of a previously blacklisted role tag.
2016-04-11 23:46:44 +00:00
< / dd >
< dt > Method< / dt >
< dd > GET< / dd >
< dt > URL< / dt >
2016-05-29 14:55:06 +00:00
< dd > `/auth/aws-ec2/broletag-blacklist/< role_tag > `< / dd >
2016-04-11 23:46:44 +00:00
< dt > Parameters< / dt >
< dd >
None.
< / dd >
< dt > Returns< / dt >
< dd >
```javascript
{
"auth": null,
"warnings": null,
"data": {
"expiration_time": "2016-04-25T10:35:20.127058773-04:00",
"creation_time": "2016-04-12T22:35:01.178348124-04:00"
},
"lease_duration": 0,
"renewable": false,
"lease_id": ""
}
```
< / dd >
< / dl >
#### LIST
< dl class = "api" >
< dt > Description< / dt >
< dd >
2016-05-12 11:19:29 +00:00
Lists all the role tags that are blacklisted.
2016-04-11 23:46:44 +00:00
< / dd >
< dt > Method< / dt >
< dd > GET< / dd >
< dt > URL< / dt >
2016-05-29 14:55:06 +00:00
< dd > `/auth/aws-ec2/roletag-blacklist?list=true`< / dd >
2016-04-11 23:46:44 +00:00
< dt > Parameters< / dt >
< dd >
None.
< / dd >
< dt > Returns< / dt >
< dd >
```javascript
{
"auth": null,
"warnings": null,
"data": {
"keys": [
"v1:09Vp0qGuyB8=:a=ami-fce3c696:p=default,prod:d=false:t=300h0m0s:uPLKCQxqsefRhrp1qmVa1wsQVUXXJG8UZP/"
]
},
"lease_duration": 0,
"renewable": false,
"lease_id": ""
}
```
< / dd >
< / dl >
#### DELETE
< dl class = "api" >
< dt > Description< / dt >
< dd >
2016-05-12 11:19:29 +00:00
Deletes a blacklisted role tag.
2016-04-11 23:46:44 +00:00
< / dd >
< dt > Method< / dt >
< dd > DELETE< / dd >
< dt > URL< / dt >
2016-05-29 14:55:06 +00:00
< dd > `/auth/aws-ec2/roletag-blacklist/< role_tag > `< / dd >
2016-04-11 23:46:44 +00:00
< dt > Parameters< / dt >
< dd >
None.
< / dd >
< dt > Returns< / dt >
< dd > `204` response code.
< / dd >
< / dl >
2016-05-29 14:55:06 +00:00
### /auth/aws-ec2/tidy/roletag-blacklist
2016-04-11 23:46:44 +00:00
#### POST
< dl class = "api" >
< dt > Description< / dt >
< dd >
Cleans up the entries in the blacklist based on expiration time on the entry and `safety_buffer` .
< / dd >
< dt > Method< / dt >
< dd > POST< / dd >
< dt > URL< / dt >
2016-05-29 14:55:06 +00:00
< dd > `/auth/aws-ec2/tidy/roletag-blacklist`< / dd >
2016-04-11 23:46:44 +00:00
< dt > Parameters< / dt >
< dd >
< ul >
< li >
< span class = "param" > safety_buffer< / span >
< span class = "param-flags" > optional< / span >
The amount of extra time that must have passed beyond the `roletag` expiration, before it is removed from the backend storage. Defaults to 72h.
< / li >
< / ul >
< / dd >
< dt > Returns< / dt >
< dd > `204` response code.
< / dd >
< / dl >
2016-05-29 14:55:06 +00:00
### /auth/aws-ec2/identity-whitelist/<instance_id>
2016-04-11 23:46:44 +00:00
#### GET
< dl class = "api" >
< dt > Description< / dt >
< dd >
Returns an entry in the whitelist. An entry will be created/updated by every successful login.
< / dd >
< dt > Method< / dt >
< dd > GET< / dd >
< dt > URL< / dt >
2016-05-29 14:55:06 +00:00
< dd > `/auth/aws-ec2/identity-whitelist/< instance_id > `< / dd >
2016-04-11 23:46:44 +00:00
< dt > Parameters< / dt >
< dd >
< ul >
< li >
< span class = "param" > instance_id< / span >
< span class = "param-flags" > required< / span >
2016-05-12 11:19:29 +00:00
EC2 instance ID. A successful login operation from an EC2 instance
gets cached in this whitelist, keyed off of instance ID.
2016-04-11 23:46:44 +00:00
< / li >
< / ul >
< / dd >
< dt > Returns< / dt >
2016-04-14 14:41:49 +00:00
< dd >
```javascript
{
"auth": null,
"warnings": null,
"data": {
"pending_time": "2016-04-14T01:01:41Z",
"expiration_time": "2016-05-05 10:09:16.67077232 +0000 UTC",
"creation_time": "2016-04-14 14:09:16.67077232 +0000 UTC",
2016-09-14 15:17:45 +00:00
"client_nonce": "5defbf9e-a8f9-3063-bdfc-54b7a42a1f95",
2016-05-13 18:31:13 +00:00
"role": "dev-role"
2016-04-14 14:41:49 +00:00
},
"lease_duration": 0,
"renewable": false,
"lease_id": ""
}
```
2016-04-11 23:46:44 +00:00
< / dd >
< / dl >
#### LIST
< dl class = "api" >
< dt > Description< / dt >
< dd >
Lists all the instance IDs that are in the whitelist of successful logins.
< / dd >
< dt > Method< / dt >
< dd > GET< / dd >
< dt > URL< / dt >
2016-05-29 14:55:06 +00:00
< dd > `/auth/aws-ec2/identity-whitelist?list=true`< / dd >
2016-04-11 23:46:44 +00:00
< dt > Parameters< / dt >
< dd >
None.
< / dd >
< dt > Returns< / dt >
< dd > `204` response code.
2016-04-14 14:41:49 +00:00
```javascript
{
"auth": null,
"warnings": null,
"data": {
"keys": [
"i-aab47d37"
]
},
"lease_duration": 0,
"renewable": false,
"lease_id": ""
}
```
2016-04-11 23:46:44 +00:00
< / dd >
< / dl >
#### DELETE
< dl class = "api" >
< dt > Description< / dt >
< dd >
Deletes a cache of the successful login from an instance.
< / dd >
< dt > Method< / dt >
< dd > DELETE< / dd >
< dt > URL< / dt >
2016-05-29 14:55:06 +00:00
< dd > `/auth/aws-ec2/identity-whitelist/< instance_id > `< / dd >
2016-04-11 23:46:44 +00:00
< dt > Parameters< / dt >
< dd >
None.
< / dd >
< dt > Returns< / dt >
< dd > `204` response code.
< / dd >
< / dl >
2016-05-29 14:55:06 +00:00
### /auth/aws-ec2/tidy/identity-whitelist
2016-04-11 23:46:44 +00:00
#### POST
< dl class = "api" >
< dt > Description< / dt >
< dd >
Cleans up the entries in the whitelist based on expiration time and `safety_buffer` .
< / dd >
< dt > Method< / dt >
< dd > POST< / dd >
< dt > URL< / dt >
2016-05-29 14:55:06 +00:00
< dd > `/auth/aws-ec2/tidy/identity-whitelist`< / dd >
2016-04-11 23:46:44 +00:00
< dt > Parameters< / dt >
< dd >
< ul >
< li >
< span class = "param" > safety_buffer< / span >
< span class = "param-flags" > optional< / span >
The amount of extra time that must have passed beyond the identity expiration, before it is removed from the backend storage. Defaults to 72h.
< / li >
< / ul >
< / dd >
< dt > Returns< / dt >
< dd > `204` response code.
< / dd >
< / dl >