-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[DOCS] Add GUI for Azure Secret Engine configuration #29647
base: main
Are you sure you want to change the base?
Conversation
CI Results: |
Build Results: |
```shell | ||
<Tabs> | ||
|
||
<Tab heading="Vault CLI"> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
<Tab heading="Vault CLI"> | |
<Tab heading="CLI"> |
$ vault secrets enable azure | ||
Success! Enabled the azure secrets engine at: azure/ | ||
``` | ||
|
||
By default, the secrets engine will mount at the name of the engine. To | ||
enable the secrets engine at a different path, use the `-path` argument. | ||
|
||
</Tab> | ||
|
||
<Tab heading="Vault UI"> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
<Tab heading="Vault UI"> | |
<Tab heading="GUI"> |
</Tab> | ||
|
||
<Tab heading="Vault UI"> | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We should use screenshots sparingly. Generally, we want to pick one "hero" screenshot that helps folks orient themselves in the GUI to make sure they're looking at the right screen.
1. Open the web UI for your Vault instance. | ||
1. Select **Secret Engines** from the left-hand menu. | ||
1. Right click **Enable new engine** on the Secret Engines page. | ||
1. Select **Azure**. | ||
1. Click **Next**. | ||
1. Set the mount path for the Azure plugin. For example, `azure`. | ||
1. If you are an Enterprise user configuring Workload Identity Federation, you can add the Identity Token Key during the mounting process through the UI. | ||
- Click **Method Options**. | ||
- Click on the **Identity Token Key** input. If you have **list** permissions to the `identity/oidc/key` you will see a dropdown of available keys. You can create your own if one does not exists. | ||
![Partial screenshot of the Vault GUI showing the "Identity token key" search select input](/img/gui/azure/identityTokenKey.png) | ||
- If you do not have **list** permissions to `identity/oidc/key` you can input your own key name. | ||
![Partial screenshot of the Vault GUI showing the "Identity token key" input when user does not have list permissions to `identity/oidc/key`](/img/gui/azure/noList.png) | ||
|
||
1. Click **Enable engine**. | ||
1. Click **Save** to enable the plugin. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
1. Open the web UI for your Vault instance. | |
1. Select **Secret Engines** from the left-hand menu. | |
1. Right click **Enable new engine** on the Secret Engines page. | |
1. Select **Azure**. | |
1. Click **Next**. | |
1. Set the mount path for the Azure plugin. For example, `azure`. | |
1. If you are an Enterprise user configuring Workload Identity Federation, you can add the Identity Token Key during the mounting process through the UI. | |
- Click **Method Options**. | |
- Click on the **Identity Token Key** input. If you have **list** permissions to the `identity/oidc/key` you will see a dropdown of available keys. You can create your own if one does not exists. | |
![Partial screenshot of the Vault GUI showing the "Identity token key" search select input](/img/gui/azure/identityTokenKey.png) | |
- If you do not have **list** permissions to `identity/oidc/key` you can input your own key name. | |
![Partial screenshot of the Vault GUI showing the "Identity token key" input when user does not have list permissions to `identity/oidc/key`](/img/gui/azure/noList.png) | |
1. Click **Enable engine**. | |
1. Click **Save** to enable the plugin. | |
![Partial screenshot of the Vault GUI showing the "Identity token key" search select input](/img/gui/azure/identityTokenKey.png) | |
You must have `list` permission on the `identity/oidc/key` endpoint to view | |
existing workload identity federation (WIF) identity token keys during setup. | |
1. Open the web UI for your Vault instance. | |
1. Login under the target namespace or choose the target namespace from the | |
selector at the bottom of the left-hand menu and re-authenticate. | |
1. Select **Secrets Engines** from the left-hand menu. | |
1. Click **Enable new engine +** on the **Secrets Engines** page. | |
1. Select **Azure**. | |
1. Click **Next**. | |
1. Set the mount path for the Azure plugin. For example, `azure`. | |
1. If you use WIF, add the identity token key: | |
- Click **Method Options**. | |
- Click **Identity Token Key**. | |
- Enter your new key name or select one from the token key list. | |
1. Click **Enable engine**. | |
1. Click **Save** to enable the plugin. |
In general, we want to keep how-to guides simple by focusing on the optimal path and simplifying the instructions.
```shell | ||
<Tabs> | ||
|
||
<Tab heading="Vault CLI"> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
<Tab heading="Vault CLI"> | |
<Tab heading="CLI"> |
@@ -56,28 +88,60 @@ management tool. | |||
|
|||
Success! Data written to: azure/config | |||
``` | |||
</Tab> | |||
|
|||
<Tab heading="Vault UI"> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
<Tab heading="Vault UI"> | |
<Tab heading="GUI"> |
1. Click **Configure** from the Azure secret engine configuration view. | ||
![Partial screenshot of the Vault GUI showing the "Configure" Toolbar option](/img/gui/azure/configure-prompt.png) | ||
1. On the configuration form enter your configuration information. If you are an Enterprise user, you will see the option to select Access Type. | ||
![Partial screenshot of the Vault GUI showing the Configuration form](/img/gui/azure/configure.png) | ||
1. Save your changes. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
1. Click **Configure** from the Azure secret engine configuration view. | |
![Partial screenshot of the Vault GUI showing the "Configure" Toolbar option](/img/gui/azure/configure-prompt.png) | |
1. On the configuration form enter your configuration information. If you are an Enterprise user, you will see the option to select Access Type. | |
![Partial screenshot of the Vault GUI showing the Configuration form](/img/gui/azure/configure.png) | |
1. Save your changes. | |
![Partial screenshot of the Vault GUI showing the Configuration form](/img/gui/azure/configure.png) | |
1. Open the web UI for your Vault instance. | |
1. Login under the target namespace or choose the target namespace from the | |
selector at the bottom of the left-hand menu and re-authenticate. | |
1. Select **Secrets Engines** from the left-hand menu. | |
1. Select your `azure` plugin you want to update. | |
1. Click **Configure**. | |
1. Enter your configuration information. | |
1. Set the access type <EnterpriseAlert inline="true"> | |
1. Save your changes. |
$ vault write azure/config \ | ||
subscription_id=$AZURE_SUBSCRIPTION_ID \ | ||
tenant_id=$AZURE_TENANT_ID \ | ||
client_id=$AZURE_CLIENT_ID \ | ||
identity_token_audience=$TOKEN_AUDIENCE | ||
``` | ||
|
||
</Tab> | ||
|
||
<Tab heading="Vault UI"> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
<Tab heading="Vault UI"> | |
<Tab heading="GUI"> |
[plugin workload identity federation](#plugin-workload-identity-federation-wif) | ||
(WIF) as shown below. | ||
|
||
<Note> Workload identity federation is only available with Vault Enterprise. </Note> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
<Note> Workload identity federation is only available with Vault Enterprise. </Note> |
We should use the "enterprise-only" or "enterprise-and-hcp" partials at the top of the relevant section/page rather than adding an adhoc alert here.
Description
Vercel preview of Azure Secret engine docs