Alex Dadgar
b314c13882
Fix spelling errors ( #3390 )
2017-09-28 07:54:40 -04:00
Chris Hoffman
010575cb60
Rename "generic" secret backend to "kv" ( #3292 )
2017-09-15 09:02:29 -04:00
Minkyu Kim
2f84edc39b
Fix outdated documentation about AWS STS credentials ( #3093 ) ( #3094 )
2017-08-02 11:18:35 -04:00
Jeff Mitchell
54e3d61d6b
Use RemoteCredProvider instead of EC2RoleProvider ( #2983 )
2017-07-31 18:27:16 -04:00
Brian Rodgers
6486a40d47
docs: Added text to clarify that root
does not refer to AWS root creds ( #2950 )
2017-07-31 17:31:44 -04:00
Emre Erkunt
c7e9377000
Fixed an example on aws backend documentation about an iam profile. ( #2522 )
2017-04-04 09:03:27 -07:00
Seth Vargo
0fe2e84e3a
Update titles
2017-03-17 14:37:01 -04:00
Seth Vargo
f64bf8d183
/docs/http -> /api
2017-03-17 14:06:03 -04:00
Seth Vargo
501cf5d065
Break out API documentation for secret backends
2017-03-16 09:47:06 -07:00
Brian Vans
32d5d88119
Fixing a few typos in the docs ( #2344 )
2017-02-07 11:55:29 -05:00
Dan Gorst
4835df609d
Minor documentation tweak ( #2127 )
...
Should be arn, not policy - latter will error as that assume an inline policy json document
2016-11-24 07:36:46 -08:00
vishalnayak
6b0be2d5c4
Added user listing endpoint to userpass docs
2016-09-30 15:47:33 -04:00
Raja Nadar
f42f765ec4
doc: fixing field name to security_token ( #1850 )
...
response field is security_token, not secret_token.
2016-09-03 22:40:57 -04:00
Andrew Backhouse
f8c49840fa
Update index.html.md ( #1819 )
...
Corrected a minor spelling error.
2016-08-31 10:02:43 -04:00
Jeff Mitchell
976876ac4b
Update website with POST STS path
2016-08-30 10:37:55 -04:00
Jeff Mitchell
503a13b17b
Remove erroneous information about some endpoints being root-protected
2016-08-04 16:08:54 -04:00
Cameron Stokes
1b66c6534c
~secret/aws: env variable and IAM role usage
2016-08-04 13:02:07 -07:00
vishalnayak
c37ef12834
Added list functionality to logical aws backend's roles
2016-06-20 19:51:04 -04:00
Steve Jansen
69740e57e0
Adds sts:AssumeRole support to the AWS secret backend
...
Support use cases where you want to provision STS tokens
using Vault, but, you need to call AWS APIs that are blocked
for federated tokens. For example, STS federated tokens cannot
invoke IAM APIs, such as Terraform scripts containing
`aws_iam_*` resources.
2016-05-05 23:32:41 -04:00
Jeff Mitchell
bfae0223da
Merge pull request #1290 from steve-jansen/patch-2
...
Adds note on GH-1102 fix to secret/aws doc
2016-04-05 08:37:39 -04:00
Steve Jansen
03da496bd2
Adds note on GH-1102 fix to secret/aws doc
...
Add note related to #1102 , which leads to a non-obvious AWS error message on 0.5.0 or earlier.
2016-04-04 21:30:41 -04:00
Steve Jansen
64b472dc57
Fix typo in iam permission for STS
2016-04-04 21:20:26 -04:00
Matt Hurne
80ca13ce7e
AWS permissions documentation fixes: add missing permissions needed to attach and detach managed policies to IAM users, add missing comma, remove extraneous comma
2016-03-14 09:39:32 -04:00
Jeff Mitchell
c2727991c1
Add a necessary IAM permission to the example
2016-03-08 21:29:34 -05:00
Matt Hurne
ac835c4e61
Add note that STS credentials can only be generated for user inline policies in AWS secret backend documentation
2016-02-23 09:06:52 -05:00
Nicki Watt
a616197add
AWS secret backend - docs when using existing policy
2016-01-26 01:43:14 +00:00
Nicki Watt
e10f5b2b1a
Docs for AWS backend when using an existing policy
2016-01-26 01:39:24 +00:00
Dmitriy Gromov
ea1e29fa33
Renamed sts duration to ttl and added STS permissions note.
2016-01-21 14:28:34 -05:00
Dmitriy Gromov
e13f58713e
documenting the new aws/sts endpoint
2016-01-21 14:05:10 -05:00
Seth Vargo
9e14bb66f2
Use HTTPS + www where appropriate
2016-01-14 13:42:47 -05:00
Jeff Mitchell
70ea26c0e5
Add a warning about consistency of IAM credentials as a stop-gap.
...
Ping #687
2015-12-08 10:56:34 -05:00
Seth Vargo
cfd7aa5983
Remove tabs from terminal output
...
This also standardizes on the indentation we use for multi-line commands as
well as prefixes all commands with a $ to indicate a shell.
2015-10-12 12:10:22 -04:00
Brian Lalor
ade8c31469
Remove unused param to 'vault write aws/roles/deploy'
...
The name is taken from the path, not the request body. Having the duplicate key is confusing.
2015-09-06 06:57:39 -04:00
Armon Dadgar
dc5ecc3eed
website: fixing lots of references to vault help
2015-07-13 20:12:09 +10:00
Sheldon Hearn
5a28f0bcbd
Missed a few IAM permissions
2015-05-27 16:42:12 +02:00
Sheldon Hearn
7cba6f84de
List IAM permissions required by root credentials
2015-05-27 16:28:24 +02:00
Armon Dadgar
478a5965ee
secret/aws: Using roles instead of policy
2015-04-27 14:20:28 -07:00
Armon Dadgar
aaf10cd624
Do not root protect role configurations
2015-04-27 14:07:20 -07:00
Armon Dadgar
26b5dc20c6
website: aws API
2015-04-27 12:26:23 -07:00
Seth Vargo
ad8f1f3659
Add Quick Start for AWS
2015-04-27 09:29:16 -04:00
Mitchell Hashimoto
148129030b
website: aws secret backend
2015-04-10 20:24:45 -07:00