Edward Z. Yang
ac98730578
Vault user needed to use STS Federation Tokens ( #4108 )
...
If you try to use role authorization to get an STS token, you'll get this error:
* Error generating STS keys: AccessDenied: Cannot call GetFederationToken with session credentials
2018-03-14 10:24:29 -04:00
Chris Bartlett
c7580b2961
#3850 Fixed documentation for aws/sts ttl ( #3851 )
2018-01-25 22:20:30 -05:00
Seth Vargo
51a27b758b
Resolve the most painful merge conflict known on earth
2017-10-24 09:34:12 -04:00
Alex Dadgar
f56e191020
Fix spelling errors ( #3390 )
2017-09-28 07:54:40 -04:00
Chris Hoffman
1029ad3b33
Rename "generic" secret backend to "kv" ( #3292 )
2017-09-15 09:02:29 -04:00
Minkyu Kim
68fd01e3fc
Fix outdated documentation about AWS STS credentials ( #3093 ) ( #3094 )
2017-08-02 11:18:35 -04:00
Jeff Mitchell
4885b3e502
Use RemoteCredProvider instead of EC2RoleProvider ( #2983 )
2017-07-31 18:27:16 -04:00
Brian Rodgers
d8e47e6f79
docs: Added text to clarify that root
does not refer to AWS root creds ( #2950 )
2017-07-31 17:31:44 -04:00
Emre Erkunt
de3d2438b7
Fixed an example on aws backend documentation about an iam profile. ( #2522 )
2017-04-04 09:03:27 -07:00
Seth Vargo
21ecbda1f4
Update titles
2017-03-17 14:37:01 -04:00
Seth Vargo
d4390d103e
/docs/http -> /api
2017-03-17 14:06:03 -04:00
Seth Vargo
3fd0bd36cc
Break out API documentation for secret backends
2017-03-16 09:47:06 -07:00
Brian Vans
29b3cc6b00
Fixing a few typos in the docs ( #2344 )
2017-02-07 11:55:29 -05:00
Dan Gorst
e1d3650b7f
Minor documentation tweak ( #2127 )
...
Should be arn, not policy - latter will error as that assume an inline policy json document
2016-11-24 07:36:46 -08:00
vishalnayak
2ad698ec0b
Added user listing endpoint to userpass docs
2016-09-30 15:47:33 -04:00
Raja Nadar
b06167c748
doc: fixing field name to security_token ( #1850 )
...
response field is security_token, not secret_token.
2016-09-03 22:40:57 -04:00
Andrew Backhouse
2f35789e71
Update index.html.md ( #1819 )
...
Corrected a minor spelling error.
2016-08-31 10:02:43 -04:00
Jeff Mitchell
93b5b2a2c0
Update website with POST STS path
2016-08-30 10:37:55 -04:00
Jeff Mitchell
21e39bfea6
Remove erroneous information about some endpoints being root-protected
2016-08-04 16:08:54 -04:00
Cameron Stokes
0b60375952
~secret/aws: env variable and IAM role usage
2016-08-04 13:02:07 -07:00
vishalnayak
8b490e44a1
Added list functionality to logical aws backend's roles
2016-06-20 19:51:04 -04:00
Steve Jansen
597d59962c
Adds sts:AssumeRole support to the AWS secret backend
...
Support use cases where you want to provision STS tokens
using Vault, but, you need to call AWS APIs that are blocked
for federated tokens. For example, STS federated tokens cannot
invoke IAM APIs, such as Terraform scripts containing
`aws_iam_*` resources.
2016-05-05 23:32:41 -04:00
Jeff Mitchell
d72e462686
Merge pull request #1290 from steve-jansen/patch-2
...
Adds note on GH-1102 fix to secret/aws doc
2016-04-05 08:37:39 -04:00
Steve Jansen
d2b3d924ca
Adds note on GH-1102 fix to secret/aws doc
...
Add note related to #1102 , which leads to a non-obvious AWS error message on 0.5.0 or earlier.
2016-04-04 21:30:41 -04:00
Steve Jansen
89c7f312e4
Fix typo in iam permission for STS
2016-04-04 21:20:26 -04:00
Matt Hurne
4ee6b04405
AWS permissions documentation fixes: add missing permissions needed to attach and detach managed policies to IAM users, add missing comma, remove extraneous comma
2016-03-14 09:39:32 -04:00
Jeff Mitchell
123d7b71d4
Add a necessary IAM permission to the example
2016-03-08 21:29:34 -05:00
Matt Hurne
f4d8852259
Add note that STS credentials can only be generated for user inline policies in AWS secret backend documentation
2016-02-23 09:06:52 -05:00
Nicki Watt
c57072d39a
AWS secret backend - docs when using existing policy
2016-01-26 01:43:14 +00:00
Nicki Watt
35a0d28620
Docs for AWS backend when using an existing policy
2016-01-26 01:39:24 +00:00
Dmitriy Gromov
4abca91d66
Renamed sts duration to ttl and added STS permissions note.
2016-01-21 14:28:34 -05:00
Dmitriy Gromov
0b5e35c8cd
documenting the new aws/sts endpoint
2016-01-21 14:05:10 -05:00
Seth Vargo
e40c77ff27
Use HTTPS + www where appropriate
2016-01-14 13:42:47 -05:00
Jeff Mitchell
902b7b0589
Add a warning about consistency of IAM credentials as a stop-gap.
...
Ping #687
2015-12-08 10:56:34 -05:00
Seth Vargo
50f720bc06
Remove tabs from terminal output
...
This also standardizes on the indentation we use for multi-line commands as
well as prefixes all commands with a $ to indicate a shell.
2015-10-12 12:10:22 -04:00
Brian Lalor
2ae48fa586
Remove unused param to 'vault write aws/roles/deploy'
...
The name is taken from the path, not the request body. Having the duplicate key is confusing.
2015-09-06 06:57:39 -04:00
Armon Dadgar
3042452def
website: fixing lots of references to vault help
2015-07-13 20:12:09 +10:00
Sheldon Hearn
89e7bb2569
Missed a few IAM permissions
2015-05-27 16:42:12 +02:00
Sheldon Hearn
3d2005ea56
List IAM permissions required by root credentials
2015-05-27 16:28:24 +02:00
Armon Dadgar
434305a6c2
secret/aws: Using roles instead of policy
2015-04-27 14:20:28 -07:00
Armon Dadgar
5edf8cf3a8
Do not root protect role configurations
2015-04-27 14:07:20 -07:00
Armon Dadgar
04421a5635
website: aws API
2015-04-27 12:26:23 -07:00
Seth Vargo
0ffbd1f8ea
Add Quick Start for AWS
2015-04-27 09:29:16 -04:00
Mitchell Hashimoto
3266f9513f
website: aws secret backend
2015-04-10 20:24:45 -07:00