open-vault/builtin
Theron Voran e1a432a167
AWS: Add iam_groups parameter to role create/update (#8811)
Allows vault roles to be associated with IAM groups in the AWS
secrets engine, since IAM groups are a recommended way to manage
IAM user policies. IAM users generated against a vault role will
be added to the IAM Groups. For a credential type of
`assumed_role` or `federation_token`, the policies sent to the
corresponding AWS call (sts:AssumeRole or sts:GetFederation) will
be the policies from each group in `iam_groups` combined with the
`policy_document` and `policy_arns` parameters.

Co-authored-by: Jim Kalafut <jkalafut@hashicorp.com>
2020-06-09 16:56:12 -07:00
..
audit Format requests/responses ahead of time in file audit (#7024) 2019-07-01 16:07:03 -04:00
credential Add a new "vault monitor" command (#8477) 2020-05-21 13:07:50 -07:00
logical AWS: Add iam_groups parameter to role create/update (#8811) 2020-06-09 16:56:12 -07:00
plugin Add a unit test for plugin initialization (#7158) 2019-09-26 10:01:45 -04:00