Boundary
Credential libraries
A credential library is a resource that provides credentials of the same type and same access level from a single credential store.
Attributes
A credential library has the following configurable attributes:
name
- (optional) If you set this attribute, thename
must be unique within the credential library's parent credential store.description
- (optional) A user-defined description of the credential library for identification purposes.
Vault generic credential library attributes
The generic Vault credential library has the following additional attributes:
vault-path
- (required) The path in Vault to request credentials from.credential-type
- (optional) The type of credential this library issues. The default value isunspecified
.credential-mapping-override
- (optional) If set, this value overrides the field attributes in the credential that is retrieved from Vault.vault-http-method
- (optional) The HTTP method the library uses when it requests credentials from Vault. Can be eitherGET
orPOST
. The default value isGET
.vault-http-request-body
- (optional) The body of the HTTP request the library sends to Vault when it requests credentials. Only valid ifhttp_method
is set toPOST
.
Vault SSH certificate credential library attributes HCP/ENT
As of Boundary 0.12.0, you can configure SSH credential injection using Vault's SSH secrets engine to create the SSH certificate credentials. SSH certificate-based authentication extends key-based authentication using digital signatures. Your users' authenticity is determined by a certificate signed by a trusted certificate authority (CA). You can configure Vault's SSH secrets engine to act as the CA.
SSH certificates let you specify how long they are valid for, who can gain access to a target host, how users can log in, and what commands can be used on the target machine. Unlike SSH key pairs, SSH certificates are short-lived and self-destructive.
A Vault SSH certificate credential library has the following additional attributes:
Note
The certificate is issued for the entire session, so if the ttl
value is shorter than the target's session_max_seconds
value, later connections may fail.
To prevent failures, you should ensure that the ttl
value is equal to or longer than the target's session_max_seconds
.
Alternatively, you could set the session_connection_limit
to 1
for any targets that use the credential library.
vault-path
- (required) The path in Vault to request credentials from.username
- (required) The username to use with the SSH certificate. You can create a template for this value using Vault credential library parameter templating.key_type
- (optional) The type of key to use for the generated SSH private key. The key type is eithered25519
,ecdsa
, orrsa
. The default key type ised25519
.key_bits
- (optional) The number of bits used to generate the SSH private key. The number of bits depends on thekey_type
value you select:- For an
ed25519
key type, you should not set thekey_bits
value. - For an
ecdsa
key type, you can select either256
,384
, or521
. - For an
rsa
key type, you can select either2048
,3072
, or4096
.
- For an
ttl
- (optional) The SSH certificate's time-to-live (TTL).key_id
- (optional) The key ID for the created SSH certificate.critical_options
- (optional) Any critical options that the certificate should be signed for. For more information, refer to the list of critical options supported by OpenSSH.extensions
- (optional) Any extensions that the certificate should be signed for. For more information, refer to the list of extensions supported by OpenSSH. Note that thepermit-pty
value should be set for an interactive shell to function properly.
Vault credential library parameter templating
Sometimes it can be useful to provide information about a Boundary user or account when making a call to Vault. For example, this can allow picking the correct role when asking for database credentials (if roles are separated per-user), or providing a value to encode in an X.509 certificate generated by Vault. As of Boundary 0.11.1, you can template user and account information into either the path in Vault, the POST
request body, or both.
The following Vault template parameters are supported in Boundary. Note that account values are tied to the account associated with the token used to make the call:
{{.User.Id}}
- The user's ID.{{.User.Name}}
- The user's name from the user resource.{{.User.FullName}}
- The user's name from the account corresponding to the primary auth method in the user's scope. This value may not be populated, or it may be different from the account name used in the template.{{.User.Email}}
- The user's email address from the account corresponding to the primary auth method in the user's scope. This value may not be populated, or it may be different from the account name used in the template.{{.Account.Id}}
- The account's ID.{{.Account.Name}}
- The name of the account from the account resource.{{.Account.LoginName}}
- The account's login name, if a login name is used by that type of account.{{.Account.Subject}}
- The account's subject, if a subject is used by that type of account.{{.Account.Email}}
- The account's email, if email is used by that type of account.
Additionally, there is currently a single function that strips the rest of a string after a specified substring.
This function is useful for pulling a user or account name from an email address.
The following example turns foo@example.com
into foo
:
{{truncateFrom .Account.Email "@"}}
The example above uses the account email, but it could be any other parameter.
Tutorial
Refer to the SSH certificate injection with HCP Boundary tutorial to learn how to configure credential injection with SSH certificates using Vault.
Referenced by
Service API docs
The following services are relevant to this resource: