-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature Request: Add ttl and max_ttl to AWS secret engine roles #5286
Comments
The merit behind this is that the On the other hand, the The AWS secret engine currently does not allow for different max_ttl per role, which forces us to mount separate secret engines for different roles and speficy the max_ttl in the mount config. The provisioning of vault is already a rather complex task, having to split out different roles over different secret engines does not make this easier. |
I don't see why we shouldn't implement this feature. @joelthompson and @jefferai thoughts? |
Makes sense, but one note of caution on these things:
and
This will probably work for IAM users, but |
@joelthompson In reality we actually use values higher than |
Implemented in #5500 |
In our use-case, the AWS secret engine should support values for
ttl
andmax_ttl
per role. When not specified, the values should be taken from enable/mount options.Consider the following configuration (in our internal provision format):
We want to keep the
deploy
-role strict to max 30 seconds and prevent the client for setting higherttl
values: Higher values give malicious clients a longer timeframe to do harm. Now we are forced to mount separate secret engines for the rolessre
anddeploy
.If agreed, I volunteer to implement this feature request as I am familiar with the vault code and particular the AWS part.
The text was updated successfully, but these errors were encountered: