approle

devops-rob/approle/vault

Terraform Module HCL VAULT

The Vault AppRole Terraform module configures HashiCorp Vault AppRoles and associated policies for machines or applications to authenticate against Vault.

Install
module "approle" {
source = "devops-rob/approle/vault"
version = "0.1.1"
}
plain text: /constructs/tfmod-devops-rob-approle-vault/install.txt
⭐ Source on GitHub 📦 Registry page
README

Vault AppRole Terraform module The Vault AppRole Terraform module configures HashiCorp Vault AppRoles and associated policies for machines or applications to authenticate against Vault. For more information on AppRole, refer to the documentation. Prerequisites This module requires the AppRole auth method to be enabled and configured at a path of your choice. Usage This module supports the creation of Vault policies written in HCL and JSON. These policies can be stored in any location on the machine running the terraform apply. By default, the module will look in the current working directory for any policy files. This can be changed by setting the policies_path variable to the absolute path of your Vault policy files. The module will write these policies into Vault. The module also provide

Inputs (17)
NameTypeDescriptionDefault
approle_namestring(Required) The name of the AppRole. required
secret_id_bound_cidrslist(string)(Optional) If set, specifies blocks of IP addresses which can perform the login required
secret_id_ttlnumber(Optional) The number of seconds after which any SecretID expires. required
token_explicit_max_ttlnumber(Optional) If set, will encode an explicit max TTL onto the token in number of s required
role_idstring(Optional) The RoleID of this role. If not specified, one will be auto-generated required
approle_backend_pathstring(Optional) The unique name of the auth backend to configure. Defaults to `approl required
token_num_usesnumber(Optional) The period, if any, in number of seconds to set on the token. required
token_bound_cidrslist(string)(Optional) List of CIDR blocks; if set, specifies blocks of IP addresses which c required
token_max_ttlnumber(Optional) The maximum lifetime for generated tokens in number of seconds. Its c required
token_periodnumber(Optional) If set, indicates that the token generated using this role should nev required
token_ttlnumber(Optional) The maximum lifetime for generated tokens in number of seconds. Its c required
policies_pathstring(Optional) The absolute path to directory containing Vault policies. If not set,""
bind_secret_idbool(Optional) Whether or not to require `secret_id` to be presented when logging intrue
token_typestring(Optional) The type of token that should be generated. Can be service, batch, or"service"
secret_id_num_usesnumber(Optional) The number of times any particular SecretID can be used to fetch a to3600
token_no_default_policybool(Optional) If set, the default policy will not be set on generated tokens; otherfalse
additional_policieslist(string)(Optional) A list of any additional policies to add to the AppRole. These polici[]
Resources (2)
vault_approle_auth_backend_rolevault_policy
Details
FrameworkTerraform Module
LanguageHCL
Version0.1.1
Cloud VAULT
★ Stars0
Forks2
Total downloads869
Inputs17
Resources2
Examples1
LicenseApache-2.0
Namespacedevops-rob
Updated