Raja Nadar
c5a059743b
fix lookup-self response json
...
reflect the true 0.6.4 response.
2017-01-10 23:19:49 -08:00
Jeff Mitchell
ebfba76f98
Remove documenting that the token to revoke can be part of the URL as ( #2250 )
...
this should never be used and only remains for backwards compat.
Fixes #2248
2017-01-09 22:09:29 -05:00
Stenio Ferreira
e9519ebd26
Fixed docs - auth backend aws had a typo on API example ( #2211 )
2016-12-28 11:41:50 -06:00
Brian Nuszkowski
fed61f6c12
Add Duo pushinfo capabilities ( #2118 )
2016-12-19 15:37:44 -05:00
Vishal Nayak
42e133b0a8
TokenStore: Added tidy endpoint ( #2192 )
2016-12-16 15:29:27 -05:00
Vishal Nayak
b4011f7129
Don't add default policy to child token if parent does not have it ( #2164 )
2016-12-16 00:36:39 -05:00
vishesh92
577366ad9a
Fix aws auth login example ( #2122 )
2016-12-01 10:17:08 -08:00
Brian Nuszkowski
4a5ecd5d6c
Disallow passwords LDAP binds by default ( #2103 )
2016-12-01 10:11:40 -08:00
Daniel Somerfield
c33484c147
Added document to github auth backend covering user-specific policies. ( #2084 )
2016-11-11 08:59:26 -05:00
Jacob Crowther
ba4420d06b
Specify the value of "generated secrets" ( #2066 )
...
This small change is to specify (mostly for new users) that only dynamic secrets are revoked when running revoke-self.
2016-11-07 15:02:23 -05:00
vishalnayak
e2a5881bc4
s/localhost/127.0.0.1 in approle docs
2016-10-28 09:46:39 -04:00
vishalnayak
52419be7c9
s/localhost/127.0.0.1
2016-10-28 09:23:05 -04:00
vishalnayak
81410d7bc4
Using AppRole as an example. Removed 'root' policy being used in examples
2016-10-28 01:24:25 -04:00
Brian Fallik
84f1995e97
Update aws-ec2.html.md
...
fix minor typo
2016-10-26 15:40:40 -04:00
vishalnayak
174aa4adb1
Update github login output in the docs
2016-10-14 22:39:56 -04:00
Mark Paluch
7652e18aea
Use POST method for destroy operations in documentation
...
Use POST method as most clients (including Vault cli) cannot send a body when using the DELETE HTTP method.
2016-10-11 17:12:07 +02:00
Vishal Nayak
a72b7698bb
Merge pull request #1961 from hashicorp/aws-ec2-auth-rsa-signature
...
aws-ec2-auth using identity doc and RSA digest
2016-10-04 15:45:12 -04:00
vishalnayak
4e471c41fb
Minor doc updates
2016-10-04 15:46:09 -04:00
vishalnayak
84c8caefca
Address review feedback
2016-10-04 15:05:44 -04:00
vishalnayak
dda2e81895
Add only relevant certificates
2016-10-03 20:34:28 -04:00
vishalnayak
437ddeaadc
aws-ec2 config endpoints support type option to distinguish certs
2016-10-03 20:25:07 -04:00
vishalnayak
5235b9899a
Added docs for reading and deleting username
2016-09-30 16:13:57 -04:00
vishalnayak
6b0be2d5c4
Added user listing endpoint to userpass docs
2016-09-30 15:47:33 -04:00
Vishal Nayak
adf868d3a0
Merge pull request #1947 from hashicorp/secret-id-lookup-delete
...
Introduce lookup and destroy endpoints for secret IDs and its accessors
2016-09-29 10:19:54 -04:00
vishalnayak
d672d3c5dc
Added website docs for lookup and destroy APIs
2016-09-28 22:11:48 -04:00
Michael S. Fischer
e6b39d4b3f
Update documentation for required AWS API permissions
...
In order for Vault to map IAM instance profiles to roles, Vault
must query the 'iam:GetInstanceProfile' API, so update the documentation
and help to include the additional permissions needed.
2016-09-28 16:50:20 -07:00
Jeff Mitchell
c748ff322f
Change default TTL from 30 to 32 to accommodate monthly operations ( #1942 )
2016-09-28 18:32:49 -04:00
vishalnayak
d178d1d26d
Remove a mistyped character
2016-09-28 18:30:49 -04:00
vishalnayak
1887fbcd7f
Check for prefix match instead of exact match for IAM bound parameters
2016-09-28 18:08:28 -04:00
Vishal Nayak
692bbc0a12
Merge pull request #1913 from hashicorp/bound-iam-instance-profile-arn
...
Proper naming for bound_iam_instance_profile_arn
2016-09-28 15:34:56 -04:00
Vishal Nayak
92cb781be9
Merge pull request #1910 from hashicorp/secret-id-cidr-list
...
CIDR restrictions on Secret ID
2016-09-26 10:22:48 -04:00
vishalnayak
a83acd402e
Update docs to contain bound_iam_role_arn
2016-09-26 09:37:38 -04:00
vishalnayak
0d79363b1d
Update website for bound_iam_instance_profile_arn
2016-09-23 11:23:59 -04:00
vishalnayak
8ce3fa75ba
Store the CIDR list in the secret ID storage entry.
...
Use the stored information to validate the source address and credential issue time.
Correct the logic used to verify BoundCIDRList on the role.
Reverify the subset requirements between secret ID and role during credential issue time.
2016-09-21 20:19:26 -04:00
Jeff Mitchell
425a07ce87
Update docs to reflect that there is more than one constraint for EC2 now
2016-09-20 16:11:32 -04:00
Carlo Cabanilla
15001218e3
fix shell quoting ( #1904 )
...
$() doesnt get evaluated in single quotes, so you need to break out of it first
2016-09-19 17:11:16 -04:00
Vishal Nayak
5d25f8046e
Merge pull request #1892 from hashicorp/role-tag-defaults
...
Specify that role tags are not tied to an instance by default
2016-09-15 12:04:41 -04:00
vishalnayak
e9c8555d12
Updated docs with nonce usage
2016-09-14 19:31:09 -04:00
vishalnayak
1499f21947
Address review feedback
2016-09-14 16:06:38 -04:00
vishalnayak
990402c41a
Address review feedback
2016-09-14 15:13:54 -04:00
vishalnayak
79e8d83003
Clarify that tags can be used on all instances that satisfies constraints
2016-09-14 14:55:09 -04:00
vishalnayak
36bf0a25a5
Specify that role tags are not tied to an instance by default
2016-09-14 14:49:18 -04:00
vishalnayak
2de4c8bef2
Generate the nonce by default
2016-09-14 14:28:02 -04:00
vishalnayak
166d67c0a8
Ensure at least one constraint on the role
2016-09-13 16:03:15 -04:00
AJ Bourg
c3bc1f0689
Small change: Fix permission vault requires.
...
Vault requires ec2:DescribeInstances, not ec2:DescribeInstance. (the
non-plural form doesn't exist)
2016-09-12 14:38:10 -06:00
Jeff Mitchell
f02bde7c78
Fix headers in aws-ec2 doc.
2016-08-30 11:53:21 -04:00
Adam Greene
d57fe391f2
fix aws-ec2 formatting around ttl ( #1770 )
2016-08-23 16:07:57 -04:00
Karl Falconer
fff006bd91
[Documentation] AppRole /login is unauthenticated ( #1771 )
2016-08-23 16:03:36 -04:00
Jeff Mitchell
58611de06d
Swap push/pull.
2016-08-22 19:34:53 -04:00
vishalnayak
1a62fb64c2
Seperate endpoints for read/delete using secret-id and accessor
2016-08-21 14:42:49 -04:00