Hello,
The AWS backend is designed to work with Amazon's IAM product, which I
believe means (but am not sure) that it can only generate access
credentials for resources under a single AWS account. You could mount
multiple copies of the backend and have each work with a different
customer's IAM account, but that is problematic in other ways.
A better approach might be to think about using Vault to store S3
access keys for individual customers (in the "generic" backend),
separated into different paths. Then, based on which customer is
triggering an action, you can issue tokens to the requesting
applications associated with the correct policies to allow them to
read the correct paths and the needed S3 access keys from Vault. When
the token expires, they will be unable to read those keys again
without getting a new token.
The hole in this workflow is that the S3 access keys don't change, so
a badly behaving application could save or log the information
somewhere instead of properly releasing it from memory.
--Jeff
> --
> This mailing list is governed under the HashiCorp Community Guidelines -
>
https://www.hashicorp.com/community-guidelines.html. Behavior in violation
> of those guidelines may result in your removal from this mailing list.
>
> GitHub Issues:
https://github.com/hashicorp/vault/issues
> IRC: #vault-tool on Freenode
> ---
> You received this message because you are subscribed to the Google Groups
> "Vault" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to
vault-tool+...@googlegroups.com.
> To view this discussion on the web visit
>
https://groups.google.com/d/msgid/vault-tool/3363520d-997e-4a20-8a91-fc16af613867%40googlegroups.com.
> For more options, visit
https://groups.google.com/d/optout.