open-vault/website/content/docs/platform/servicenow/installation.mdx
Violet Hynes a47c0c7073
VAULT-15546 First pass at Vault Proxy docs (#20578)
* VAULT-15546 First pass at Vault Proxy docs

* VAULT-15546 correct errors

* VAULT-15546 fully qualify paths

* VAULT-15546 remove index

* VAULT-15546 Some typos and clean up

* VAULT-15546 fix link

* VAULT-15546 Add redirects so old links stay working

* VAULT-15546 more explicit redirects

* VAULT-15546 typo fixes

* Suggestions for Vault Agent & Vault Proxy docs (#20612)

* Rename 'agentandproxy' to 'agent-and-proxy' for better URL

* Update the index pages for each section

* VAULT-15546 fix link typo

---------

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2023-05-19 13:11:39 -04:00

89 lines
3 KiB
Plaintext

---
layout: docs
page_title: Install Vault ServiceNow Credential Resolver
description: Installation steps for the Vault ServiceNow Credential Resolver.
---
# Installing the Vault Credential Resolver
## Prerequisites
* ServiceNow version Quebec+ (untested on previous versions)
* MID server version Quebec+ (untested on previous versions)
* Discovery and external credential plugins activated on ServiceNow
* Working Vault deployment accessible from the MID server
## Installing Vault Agent
* Select your desired auth method from Agent's [supported auth methods](/vault/docs/agent-and-proxy/autoauth/methods)
and set it up in Vault
* For example, to set up AppRole auth and a role called `role1` with the `demo` policy attached:
```bash
vault auth enable approle
vault write auth/approle/role/role1 bind_secret_id=true token_policies=demo
```
* To get the files required for the example Agent config below, you can then
run:
```bash
echo -n $(vault read -format json auth/approle/role/role1/role-id | jq -r '.data.role_id') > /path/to/roleID
echo -n $(vault write -format json -f auth/approle/role/role1/secret-id | jq -r '.data.secret_id') > /path/to/secretID
```
* Create an `agent.hcl` config file. Your exact configuration may vary, but you
must set `cache.use_auto_auth_token = true`, and the `listener`, `vault` and
`auto_auth` blocks are also required to set up a working Agent, e.g.:
```hcl
listener "tcp" {
address = "127.0.0.1:8200"
tls_disable = false
tls_cert_file = "/path/to/cert.pem"
tls_key_file = "/path/to/key.pem"
}
cache {
use_auto_auth_token = true
}
vault {
address = "http://vault.example.com:8200"
}
auto_auth {
method {
type = "approle"
config = {
role_id_file_path = "/path/to/roleID"
secret_id_file_path = "/path/to/secretID"
remove_secret_id_file_after_reading = false
}
}
}
```
* Install Vault Agent as a service running `vault agent -config=/path/to/agent.hcl`
* Documentation for Windows service installation [here](/vault/docs/agent-and-proxy/agent/winsvc)
## Uploading JAR file to MID server
* Download the latest version of the Vault Credential Resolver JAR file from
[releases.hashicorp.com](https://releases.hashicorp.com/vault-servicenow-credential-resolver/)
* In ServiceNow, navigate to "MID server - JAR files" -> New
* Manage Attachments -> upload Vault Credential Resolver JAR
* Fill in name, version etc as desired
* Click Submit
* Navigate to "MID server - Properties" -> New
* Set Name: `mid.external_credentials.vault.address`, Value: Address of Vault
Agent listener from previous step, e.g. `http://127.0.0.1:8200`
* **Optional:** Set the property `mid.external_credentials.vault.ca` to the
trusted CA in PEM format if using TLS between the MID server and Vault
Agent with a self-signed certificate.
## Next steps
See [configuration](/vault/docs/platform/servicenow/configuration) for details on
configuring the resolver and using credentials for discovery.