auth/aws: Clarify docs for cross-account access with IAM auth (#5900)
The docs hadn't been updated to reflect the ability to do cross-account AWS IAM auth, and so it was a bit confusing as to whether that was supported. This removes the ambiguity by explicitly mentioning AWS IAM principals.
This commit is contained in:
parent
c12c21551f
commit
286b3f4e9f
|
@ -323,8 +323,8 @@ $ curl \
|
||||||
|
|
||||||
Allows the explicit association of STS roles to satellite AWS accounts
|
Allows the explicit association of STS roles to satellite AWS accounts
|
||||||
(i.e. those which are not the account in which the Vault server is
|
(i.e. those which are not the account in which the Vault server is
|
||||||
running.) Login attempts from EC2 instances running in these accounts will
|
running.) Vault will use credentials obtained by assuming these STS roles
|
||||||
be verified using credentials obtained by assumption of these STS roles.
|
when validating IAM principals or EC2 instances in the particular AWS account.
|
||||||
|
|
||||||
| Method | Path | Produces |
|
| Method | Path | Produces |
|
||||||
| :------- | :--------------------------- | :--------------------- |
|
| :------- | :--------------------------- | :--------------------- |
|
||||||
|
|
|
@ -561,15 +561,18 @@ instance fails to renew the token on time.
|
||||||
|
|
||||||
### Cross Account Access
|
### Cross Account Access
|
||||||
|
|
||||||
To allow Vault to authenticate EC2 instances running in other accounts, AWS STS
|
To allow Vault to authenticate IAM principals and EC2 instances in other
|
||||||
(Security Token Service) can be used to retrieve temporary credentials by
|
accounts, Vault supports using AWS STS (Security Token Service) to assume AWS
|
||||||
assuming an IAM Role in those accounts. All these accounts should be configured
|
IAM Roles in other accounts. For each target AWS account ID, you configure the
|
||||||
at the method using the `auth/aws-ec2/config/sts/<account_id>` endpoint.
|
IAM Role for Vault to assume using the `auth/aws/config/sts/<account_id>` and
|
||||||
|
Vault will use credentials from assuming that role to validate IAM principals
|
||||||
|
and EC2 instances in the target account.
|
||||||
|
|
||||||
The account in which Vault is running (i.e. the master account) must be listed as
|
The account in which Vault is running (i.e. the master account) must be listed as
|
||||||
a trusted entity in the IAM Role being assumed on the remote account. The Role itself
|
a trusted entity in the IAM Role being assumed on the remote account. The Role itself
|
||||||
must allow the `ec2:DescribeInstances` action, and `iam:GetInstanceProfile` if IAM Role
|
should allow the permissions specified in the (Recommended Vault IAM
|
||||||
binding is used (see below).
|
Policy)(#recommended-vault-iam-policy) except it doesn't need any further
|
||||||
|
`sts:AssumeRole` permissions.
|
||||||
|
|
||||||
Furthermore, in the master account, Vault must be granted the action `sts:AssumeRole`
|
Furthermore, in the master account, Vault must be granted the action `sts:AssumeRole`
|
||||||
for the IAM Role to be assumed.
|
for the IAM Role to be assumed.
|
||||||
|
|
Loading…
Reference in a new issue