open-vault/website/source/guides/identity/index.html.md
Yoko 1395d6ea1a
[Guide] Control Groups (#5072)
* Control Group guide

* Fixed user policy list

* Fixed a typo

* Replaced the wrong screenshot

* Added missing period
2018-08-13 14:51:32 -07:00

2.3 KiB

layout page_title sidebar_current description
guides Identity and Access Management - Guides guides-identity Once a Vault instance has been installed, the next step is to configure auth backends, secret backends, and manage keys. Vault configuration guides addresses key concepts in configuring your Vault application.

Identity and Access Management

This guide walks you through Identity and Access Management topics.

  • Secure Introduction of Vault Clients explains the mechanism of the client authentication against a Vault server.

  • Policies are used to instrument Role-Based Access Control (RBAC) by specifying access privileges. Authoring of policies is probably the first step the Vault administrator performs. This guide walks you through creating example policies for admin and provisioner users.

  • AppRole Pull Authentication guide that introduces the steps to generate tokens for machines or apps by enabling AppRole auth method.

  • AppRole with Terraform and Chef guide explains how AppRole auth method integrates with Terraform and Chef. This guide is for anyone who wishes to reproduce the demo introduced during the Delivering Secret Zero: Vault AppRole with Terraform and Chef webinar.

  • Token and Leases guide helps you understand how tokens and leases work in Vault. The understanding of the lease hierarchy and expiration mechanism helps you plan for break glass procedures and more.

  • Identity - Entities & Groups guide demonstrates the usage of Entities and Groups to manage Vault clients' identity.

Vault Enterprise

  • Sentinel Policies guide walks through the creation and usage of Role Governing Policies (RGPs) and Endpoint Governing Policies (EGPs) in Vault.

  • Control Groups can be used to enforce additional authorization factors before the request can be completed. This guide walks through the implementation of a Control Group.