Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[DOCS] Add GUI for Azure Secret Engine configuration #29647

Open
wants to merge 4 commits into
base: main
Choose a base branch
from

Conversation

Monkeychip
Copy link
Contributor

@Monkeychip Monkeychip commented Feb 14, 2025

Description

  • Adds GUI instructions for Azure Secret engine configuration.
  • Calls out WIF configuration for enterprise users.

Vercel preview of Azure Secret engine docs

@github-actions github-actions bot added the hashicorp-contributed-pr If the PR is HashiCorp (i.e. not-community) contributed label Feb 14, 2025
Copy link

CI Results:
All Go tests succeeded! ✅

@Monkeychip Monkeychip marked this pull request as ready for review February 14, 2025 18:27
@Monkeychip Monkeychip requested a review from a team as a code owner February 14, 2025 18:27
Copy link

Build Results:
All builds succeeded! ✅

```shell
<Tabs>

<Tab heading="Vault CLI">
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
<Tab heading="Vault CLI">
<Tab heading="CLI">

$ vault secrets enable azure
Success! Enabled the azure secrets engine at: azure/
```

By default, the secrets engine will mount at the name of the engine. To
enable the secrets engine at a different path, use the `-path` argument.

</Tab>

<Tab heading="Vault UI">
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
<Tab heading="Vault UI">
<Tab heading="GUI">

</Tab>

<Tab heading="Vault UI">

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We should use screenshots sparingly. Generally, we want to pick one "hero" screenshot that helps folks orient themselves in the GUI to make sure they're looking at the right screen.

Comment on lines +56 to +70
1. Open the web UI for your Vault instance.
1. Select **Secret Engines** from the left-hand menu.
1. Right click **Enable new engine** on the Secret Engines page.
1. Select **Azure**.
1. Click **Next**.
1. Set the mount path for the Azure plugin. For example, `azure`.
1. If you are an Enterprise user configuring Workload Identity Federation, you can add the Identity Token Key during the mounting process through the UI.
- Click **Method Options**.
- Click on the **Identity Token Key** input. If you have **list** permissions to the `identity/oidc/key` you will see a dropdown of available keys. You can create your own if one does not exists.
![Partial screenshot of the Vault GUI showing the "Identity token key" search select input](/img/gui/azure/identityTokenKey.png)
- If you do not have **list** permissions to `identity/oidc/key` you can input your own key name.
![Partial screenshot of the Vault GUI showing the "Identity token key" input when user does not have list permissions to `identity/oidc/key`](/img/gui/azure/noList.png)

1. Click **Enable engine**.
1. Click **Save** to enable the plugin.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
1. Open the web UI for your Vault instance.
1. Select **Secret Engines** from the left-hand menu.
1. Right click **Enable new engine** on the Secret Engines page.
1. Select **Azure**.
1. Click **Next**.
1. Set the mount path for the Azure plugin. For example, `azure`.
1. If you are an Enterprise user configuring Workload Identity Federation, you can add the Identity Token Key during the mounting process through the UI.
- Click **Method Options**.
- Click on the **Identity Token Key** input. If you have **list** permissions to the `identity/oidc/key` you will see a dropdown of available keys. You can create your own if one does not exists.
![Partial screenshot of the Vault GUI showing the "Identity token key" search select input](/img/gui/azure/identityTokenKey.png)
- If you do not have **list** permissions to `identity/oidc/key` you can input your own key name.
![Partial screenshot of the Vault GUI showing the "Identity token key" input when user does not have list permissions to `identity/oidc/key`](/img/gui/azure/noList.png)
1. Click **Enable engine**.
1. Click **Save** to enable the plugin.
![Partial screenshot of the Vault GUI showing the "Identity token key" search select input](/img/gui/azure/identityTokenKey.png)
You must have `list` permission on the `identity/oidc/key` endpoint to view
existing workload identity federation (WIF) identity token keys during setup.
1. Open the web UI for your Vault instance.
1. Login under the target namespace or choose the target namespace from the
selector at the bottom of the left-hand menu and re-authenticate.
1. Select **Secrets Engines** from the left-hand menu.
1. Click **Enable new engine +** on the **Secrets Engines** page.
1. Select **Azure**.
1. Click **Next**.
1. Set the mount path for the Azure plugin. For example, `azure`.
1. If you use WIF, add the identity token key:
- Click **Method Options**.
- Click **Identity Token Key**.
- Enter your new key name or select one from the token key list.
1. Click **Enable engine**.
1. Click **Save** to enable the plugin.

In general, we want to keep how-to guides simple by focusing on the optimal path and simplifying the instructions.

```shell
<Tabs>

<Tab heading="Vault CLI">
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
<Tab heading="Vault CLI">
<Tab heading="CLI">

@@ -56,28 +88,60 @@ management tool.

Success! Data written to: azure/config
```
</Tab>

<Tab heading="Vault UI">
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
<Tab heading="Vault UI">
<Tab heading="GUI">

Comment on lines +95 to +99
1. Click **Configure** from the Azure secret engine configuration view.
![Partial screenshot of the Vault GUI showing the "Configure" Toolbar option](/img/gui/azure/configure-prompt.png)
1. On the configuration form enter your configuration information. If you are an Enterprise user, you will see the option to select Access Type.
![Partial screenshot of the Vault GUI showing the Configuration form](/img/gui/azure/configure.png)
1. Save your changes.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
1. Click **Configure** from the Azure secret engine configuration view.
![Partial screenshot of the Vault GUI showing the "Configure" Toolbar option](/img/gui/azure/configure-prompt.png)
1. On the configuration form enter your configuration information. If you are an Enterprise user, you will see the option to select Access Type.
![Partial screenshot of the Vault GUI showing the Configuration form](/img/gui/azure/configure.png)
1. Save your changes.
![Partial screenshot of the Vault GUI showing the Configuration form](/img/gui/azure/configure.png)
1. Open the web UI for your Vault instance.
1. Login under the target namespace or choose the target namespace from the
selector at the bottom of the left-hand menu and re-authenticate.
1. Select **Secrets Engines** from the left-hand menu.
1. Select your `azure` plugin you want to update.
1. Click **Configure**.
1. Enter your configuration information.
1. Set the access type <EnterpriseAlert inline="true">
1. Save your changes.

$ vault write azure/config \
subscription_id=$AZURE_SUBSCRIPTION_ID \
tenant_id=$AZURE_TENANT_ID \
client_id=$AZURE_CLIENT_ID \
identity_token_audience=$TOKEN_AUDIENCE
```

</Tab>

<Tab heading="Vault UI">
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
<Tab heading="Vault UI">
<Tab heading="GUI">

[plugin workload identity federation](#plugin-workload-identity-federation-wif)
(WIF) as shown below.

<Note> Workload identity federation is only available with Vault Enterprise. </Note>
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
<Note> Workload identity federation is only available with Vault Enterprise. </Note>

We should use the "enterprise-only" or "enterprise-and-hcp" partials at the top of the relevant section/page rather than adding an adhoc alert here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants