* Import the kubernetes credential backend * Add kubernetes docs * Escape * characters * Revert "Import the kubernetes credential backend" This reverts commit f12627a9427bcde7e73cea41dea19d0922f94789. * Update the vendored directory
4.5 KiB
layout | page_title | sidebar_current | description |
---|---|---|---|
docs | Auth Plugin Backend: Kubernetes | docs-auth-kubernetes | The Kubernetes auth backend allows automated authentication of Kubernetes Service Accouts. |
Auth Backend: Kubernetes
Name: kubernetes
The Kubernetes auth backend can be used to authenticate with Vault using a Kubernetes Service Account Token. This method of authentication makes it easy to introduce a Vault token into a Kubernetes Pod.
Authentication
Via the CLI
$ vault write auth/kubernetes/login role=demo jwt=...
Key Value
--- -----
token 1a445c6a-1ff5-7085-18f7-eca12210981d
token_accessor fa82afb3-298b-41b0-6593-8b861bd3dc12
token_duration 768h0m0s
token_renewable true
token_policies [default]
token_meta_service_account_secret_name "vault-auth-token-pd21c"
token_meta_service_account_uid "aa9aa8ff-98d0-11e7-9bb7-0800276d99bf"
token_meta_role "demo"
token_meta_service_account_name "vault-auth"
token_meta_service_account_namespace "default"
Via the API
The endpoint for the kubernetes login is auth/kubernetes/login
.
The kubernetes
mountpoint value in the url is the default mountpoint value.
If you have mounted the kubernetes
backend with a different mountpoint, use that value.
$ curl $VAULT_ADDR/v1/auth/kubernetes/login \
-d '{ "jwt": "your_service_account_jwt", "role": "demo" }'
The response will be in JSON. For example:
{
"request_id": "e344f8c2-fffc-c3e0-d118-e3a2e5de2d0d",
"lease_id": "",
"lease_duration": 0,
"renewable": false,
"data": null,
"warnings": null,
"auth": {
"client_token": "38fe9691-e623-7238-f618-c94d4e7bc674",
"accessor": "78e87a38-84ed-2692-538f-ca8b9f400ab3",
"policies": [
"default"
],
"metadata": {
"role": "test",
"service_account_name": "vault-auth",
"service_account_namespace": "default",
"service_account_secret_name": "vault-auth-token-pd21c",
"service_account_uid": "aa9aa8ff-98d0-11e7-9bb7-0800276d99bf"
},
"lease_duration": 2764800,
"renewable": true
}
}
Configuration
First, you must enable the Kubernetes auth backend:
$ vault auth-enable kubernetes
Successfully enabled 'kubernetes' at 'kubernetes'!
Now when you run vault auth -methods
, the Kubernetes backend is available:
Path Type Description
kubernetes/ kubernetes
token/ token token based credentials
Prior to using the Kubernetes auth backend, it must be configured. To
configure it, use the /config
endpoint.
$ vault write auth/kubernetes/config \
pem_keys=@signingkey.crt \
kubernetes_host=https://192.168.99.100:8443 \
kubernetes_ca_cert=@ca.crt
Creating a Role
Authentication with this backend is role based. Before a token can be used to login it first must be configured in a role.
vault write auth/kubernetes/role/demo \
bound_service_account_names=vault-auth \
bound_service_account_namespaces=default \
policies=default \
ttl=1h
This role Authorizes the vault-auth service account in the default namespace and it gives it the default policy.
Configuring Kubernetes
This backend accesses the Kubernetes TokenReview
API
to validate the provided JWT is still valid. Kubernetes should be running with
--service-account-lookup
. This is defaulted to true in Kubernetes 1.7, but any
versions prior should ensure the Kubernetes API server is started with with this
setting. Otherwise deleted tokens in Kubernetes will not be properly revoked and
will be able to authenticate to this backend.
Service Accounts used in this backend will need to have access to the TokenReview API. If Kubernetes is configured to use RBAC roles the Service Account should be granted permissions to access this API. The following example ClusterRoleBinding could be used to grant these permissions:
apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRoleBinding
metadata:
name: role-tokenreview-binding
namespace: default
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: system:auth-delegator
subjects:
- kind: ServiceAccount
name: vault-auth
namespace: default
API
The Kubernetes Auth Plugin has a full HTTP API. Please see the API docs for more details.