open-vault/builtin/logical/aws
Joel Thompson 551b7a5e5c secret/aws: Support permissions boundaries on iam_user creds (#6786)
* secrets/aws: Support permissions boundaries on iam_user creds

This allows configuring Vault to attach a permissions boundary policy to
IAM users that it creates, configured on a per-Vault-role basis.

* Fix indentation of policy in docs

Use spaces instead of tabs
2019-09-19 16:35:12 -07:00
..
cmd/aws Update to api 1.0.1 and sdk 0.1.8 2019-04-15 14:10:07 -04:00
backend.go Switch to go modules (#6585) 2019-04-13 03:44:06 -04:00
backend_test.go secret/aws: Support permissions boundaries on iam_user creds (#6786) 2019-09-19 16:35:12 -07:00
client.go Create sdk/ and api/ submodules (#6583) 2019-04-12 17:54:35 -04:00
path_config_lease.go Switch to go modules (#6585) 2019-04-13 03:44:06 -04:00
path_config_root.go Add reading AWS root/config endpoint (#7245) 2019-09-13 10:07:04 -07:00
path_config_root_test.go Add reading AWS root/config endpoint (#7245) 2019-09-13 10:07:04 -07:00
path_config_rotate_root.go Switch to go modules (#6585) 2019-04-13 03:44:06 -04:00
path_roles.go secret/aws: Support permissions boundaries on iam_user creds (#6786) 2019-09-19 16:35:12 -07:00
path_roles_test.go secret/aws: Support permissions boundaries on iam_user creds (#6786) 2019-09-19 16:35:12 -07:00
path_user.go secret/aws: Pass policy ARNs to AssumedRole and FederationToken roles (#6789) 2019-08-20 12:34:41 -07:00
rollback.go Switch to go modules (#6585) 2019-04-13 03:44:06 -04:00
secret_access_keys.go secret/aws: Support permissions boundaries on iam_user creds (#6786) 2019-09-19 16:35:12 -07:00
secret_access_keys_test.go Allow use of pre-existing policies for AWS users 2015-12-30 18:05:54 +00:00