Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enable Vault PKI secrets engine #1925

Closed
bnevis-i opened this issue Oct 15, 2019 · 0 comments · Fixed by edgexfoundry/edgex-docs#287
Closed

Enable Vault PKI secrets engine #1925

bnevis-i opened this issue Oct 15, 2019 · 0 comments · Fixed by edgexfoundry/edgex-docs#287
Labels
enhancement New feature or request security-services wontfix This will not be worked on

Comments

@bnevis-i
Copy link
Collaborator

bnevis-i commented Oct 15, 2019

🚀 Feature Request

Relevant Package

Affects security-secrets-setup (#1924) and secret store configuration
This is a sub-story of https://github.com/edgexfoundry/edgex-go/issues/1950.

Description (original)

There are multiple reasons why one would want to enable the PKI secrets engine in Vault:

  • Enable TLS-encrypted communications between micro-services. (Note: Consul Connect has built-in Vault integration for just this purpose)
  • Simplify the installation of the Kong proxy certificate (Streamline proxy certificate upload flow #1922)
  • Enable service-to-service authentication via mutual-auth TLS or JWT signatures
  • Unforseen end-user use-cases for a local PKI

For these reasons it would be useful to import an intermediate CA (#1924) into Vault, enable the PKI secrets engine, and issue additional certificates at runtime as-needed to build additional TLS-dependent services. This will help minimize security-secrets-setup usage to just security services bootstrapping and nothing more.

Description (from merged ticket #2455)

In order to enable microservices to authenticate the server side of a connection and provide confidentiality and integrity protection of microservice communications, we should enable the Vault PKI secrets engine for issuing of leaf TLS certificates and add hooks to go-mod-secrets to request the private key at runtime in order to secure the services' REST API server.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request security-services wontfix This will not be worked on
Projects
None yet
Development

Successfully merging a pull request may close this issue.

4 participants