2247 Commits

Author SHA1 Message Date
Jeff Mitchell
51bb46302a Update some grammar 2018-10-18 13:32:42 -04:00
Pouyan Azari
46f1a3e2f0 Added link to list of all extensions for the ssh. (#5542)
Added a link to the OpenSSH extension list, this is not documented anywhere in vault documentation website.
2018-10-18 08:51:07 -07:00
Vishal Nayak
10dc74384e
Transit: Key Trim (#5388)
* Support key trimming

* Add doc

* Move trimming to its own endpoint

* Remove trimmed_min_version field from config endpoint

* Fix description

* Doc updates

* Fix response json in docs

* Address review feedback

* s/min_version/min_available_version

* Commenting and error statement updates
2018-10-17 09:05:05 -07:00
Brian Shumate
482b303b40 Docs: Basics: Tokens: Note (#5479)
- Add note about token values
2018-10-17 10:40:55 -04:00
Martin
725b295389 add mentions of authorization header support in doc (#5478) 2018-10-17 10:38:15 -04:00
Kevin Buchs
3cf5b6350b Update dynamodb.html.md (#5519) 2018-10-17 10:36:52 -04:00
Gabriel Martinez
14bcd13cef Update dynamic-secrets.html.md (#5530)
1. Using the current tutorial will return a warning after creating the role "my-role:
```bash
WARNING! The following warnings were returned from Vault:

  * Detected use of legacy role or policy parameter. Please upgrade to use the
  new parameters.
```

To fix this we need to update the command and the query. Correct entries can be found in documentation for the [AWS Engine](https://www.vaultproject.io/docs/secrets/aws/index.html).

2. `vault revoke` to `vault lease revoke`. The command bellow is updated, but the text above it was not.
2018-10-17 10:35:15 -04:00
Laura Gjerman-Uva
6647b3557d Update Replication Guide to clarify how to get a token on a newly activated Secondary replica, including need to use unseal/recovery keys from Primary if doing generate-root. (#5492) 2018-10-15 21:54:23 -07:00
Munif Tanjim
574a08c064 Update database API doc's parameter description (#5512) 2018-10-15 06:47:43 -07:00
Yoko
25eb8a8ce1
[Guide] Fixed issue 5497 (#5508)
* Fixied issue 5497

* Cleaned up the policy
2018-10-12 16:26:03 -07:00
Jeff Mitchell
f1f9ed485b Update website docs to reflect fix in #5495 2018-10-10 11:56:50 -04:00
Jeff Mitchell
320d1b7c07 Update website docs around root token generation 2018-10-10 11:51:05 -04:00
Yoko
2b713c751e
Updating the diagrams (#5488) 2018-10-09 14:51:27 -07:00
Jeff Mitchell
1289583d72 Add note about accepting 200 or 204 2018-10-09 16:54:18 -04:00
Jeff Mitchell
db5783d1f0 Remove outdated references to UUIDs for token values 2018-10-08 12:45:17 -04:00
Jeff Mitchell
a9dd2d3996
Set allowed OIDs to any value when generaing a CA. (#5462)
* Set allowed OIDs to any value when generaing a CA.

Also, allow utf-8 in addition to utf8 as the OID type specifier, and
allow `*` to specify any OID of a supported type.

* Update PKI docs
2018-10-08 09:51:43 -04:00
Jim Kalafut
4731f1319c
Fix docs typos 2018-10-05 22:53:09 -07:00
Jim Kalafut
238a93d23d
Update examples to use sha256 (#5468)
sha_256 is supported but not referenced in our API docs.
2018-10-04 09:51:54 -07:00
Jeff Mitchell
dbde07211c Remove incorrect api docs text around metadata being supported for identity aliases 2018-10-04 09:09:41 -04:00
Jeff
bf154cdff8 fix doc typo (#5455) 2018-10-03 11:25:57 -07:00
Martins Sipenko
1e1a31e8d8 Fix missing > (#5452) 2018-10-03 09:16:36 -04:00
Brian Kassouf
14a620c173
Fix identity link (#5449) 2018-10-02 17:45:17 -07:00
Brian Kassouf
760aca7055
mailto link (#5448) 2018-10-02 17:41:04 -07:00
Becca Petrin
3ebe388dc1 alicloud auto-unseal docs (#5446) 2018-10-02 17:21:26 -07:00
Chris Hoffman
4b645cb8ac
adding upgrade guide (#5447) 2018-10-02 20:18:59 -04:00
sk4ry
58c6c03398 Add ability to configure the NotBefore property of certificates in role api (#5325)
* Add ability to configure the NotBefore property of certificates in role api

* Update index.html.md

* converting field to time.Duration

* setting default back to 30s

* renaming the parameter not_before_duration to differentiate between the NotBefore datetime on the cert

* Update description
2018-10-02 11:10:43 -04:00
Joel Thompson
7e610e6227 Allow specifying role-default TTLs in AWS secret engine (#5138)
* Allow specifying role-default TTLs in AWS secret engine

* Add an acceptance test

* Add docs for AWS secret role-default TTLs

* Rename default_ttl to default_sts_ttl

* Return default_ttl as int64 instead of time.Duration

* Fix broken tests

The merge of #5383 broke the tests due to some changes in the test style
that didn't actually cause a git merge conflict. This updates the tests
to the new style.
2018-10-02 10:14:16 -04:00
Nageswara Rao Podilapu
db3b6468b4 Update page content with a generic noun (#5444)
This might be a typo, It says `A user may have a client token sent to her` instead it should say `A user may have a client token sent to them`
2018-10-02 09:31:01 -04:00
Saurabh Pal
239f2013b8 Enable TLS based communication with Zookeeper Backend (#4856)
* The added method customTLSDial() creates a tls connection to the zookeeper backend when 'tls_enabled' is set to true in config

* Update to the document for TLS configuration that is  required to enable TLS connection to Zookeeper backend

* Minor formatting update

* Minor update to the description for example config

* As per review comments from @kenbreeman, additional property description indicating support for multiple Root CAs in a single file has been added

* minor formatting
2018-10-01 14:12:08 -07:00
Brian Kassouf
6449f3d59e
Update replication-performance.html.md 2018-10-01 13:59:50 -07:00
Brian Kassouf
d73b46c2f8
Update replication-dr.html.md 2018-10-01 13:59:17 -07:00
Brian Kassouf
25ee68d5e6
Update replication-dr.html.md 2018-10-01 12:53:20 -07:00
Brian Kassouf
75f4a07916
Update replication-performance.html.md 2018-10-01 12:52:44 -07:00
Becca Petrin
52e9257110 Discuss ambient credentials in namespaces (#5431)
* discuss ambient credentials in namespaces

* update aws cred chain description
2018-10-01 15:23:54 -04:00
Chris Pick
e77f08d4e6 Note that GCP auth method needs iam API enabled (#5339)
In addition to the specific permissions that are already mentioned, the project also needs the `iam.googleapis.com` API enabled, otherwise authenticating will fail with an error similar to:

```
Error authenticating: Error making API request.

URL: PUT https://localhost:8200/v1/auth/gcp/login
Code: 400. Errors:

* could not find service account key or Google Oauth cert with given 'kid' id
```
2018-10-01 10:09:32 -07:00
Brian Shumate
adc9e821ef Guide/Identity: use consistent id/accessor example to fix #5340 (#5432) 2018-09-28 17:43:15 -04:00
Mike Christof
9a11700b64 fixed read-entity-by-name code (#5422) 2018-09-28 07:23:46 -07:00
Calvin Leung Huang
6f63f42daf docs: Update CLI page to include namespace and flags info (#5363) 2018-09-27 17:08:14 -07:00
joe miller
f2b685e0f8 add allowed_organiztaional_units parameter to cert credential backend (#5252)
Specifying the `allowed_organiztaional_units` parameter to a cert auth
backend role will require client certificates to contain at least one of
a list of one or more "organizational units" (OU).

Example use cases:

Certificates are issued to entities in an organization arrangement by
organizational unit (OU). The OU may be a department, team, or any other logical
grouping of resources with similar roles. The entities within the OU
should be granted the same policies.

```
$ vault write auth/cert/certs/ou-engineering \
    certificate=@ca.pem \
    policies=engineering \
    allowed_organiztaional_units=engineering

$ vault write auth/cert/certs/ou-engineering \
    certificate=@ca.pem \
    policies=engineering \
    allowed_organiztaional_units=engineering,support
```
2018-09-27 19:04:55 -05:00
Andy Manoske
55e657d19c
Broken link fix
Fix broken links
2018-09-26 19:48:07 -07:00
Andy Manoske
0e6030b2c3
partnerships-format
Some small formatting fixes
2018-09-26 19:41:27 -07:00
Andy Manoske
3770632494
Fix header issues
Fix partnerships docs formatting issues
2018-09-26 19:30:28 -07:00
Andy Manoske
9915d70022
Merge branch 'master' into partnerships-add-docs 2018-09-26 19:17:26 -07:00
Andy Manoske
765dd4bc2b
Update community.html.erb 2018-09-26 19:16:56 -07:00
Andy Manoske
5c6f5fa97b
Delete partnerships.html.erb 2018-09-26 19:14:06 -07:00
Andy Manoske
3b79ae27d4
Update guides.erb 2018-09-26 19:12:03 -07:00
Andy Manoske
9694a6d40e
Create index.html.md 2018-09-26 19:06:22 -07:00
Andy Manoske
3017016b01
Update partnerships.html.erb 2018-09-26 18:56:48 -07:00
Jim Kalafut
cb8a3551ed operator migrate docs (#5400)
* operator migrate docs

* Address feedback

* Fix title
2018-09-26 10:55:04 -07:00
Joel Thompson
d12547c7fa auth/aws: Make identity alias configurable (#5247)
* auth/aws: Make identity alias configurable

This is inspired by #4178, though not quite exactly what is requested
there. Rather than just use RoleSessionName as the Identity alias, the
full ARN is uses as the Alias. This mitigates against concerns that an
AWS role with an insufficiently secured trust policy could allow an
attacker to generate arbitrary RoleSessionNames in AssumeRole calls to
impersonate anybody in the Identity store that had an alias set up.
By using the full ARN, the owner of the identity store has to explicitly
trust specific AWS roles in specific AWS accounts to generate an
appropriate RoleSessionName to map back to an identity.

Fixes #4178

* Respond to PR feedback

* Remove CreateOperation

Response to PR feedback
2018-09-26 08:27:12 -07:00