I’m looking for some guidance on storing sensitive user names and passwords so that they can be used within a Docker Container.
1. Decrypt during Docker build stage so that container is ready for us, or can we just pass these values into the Container via environmental variables.
2. Decrypt during Container deployment/instantiation.
3. Decrypt at runtime for each and every use.
we have vault setup but we are not sure how we can solve above use case using Vault.
looking vault documentation not giving much details.
If any solve this issue how to pass sensitive information in docker container using Vault?
--Hridyesh
--
This mailing list is governed under the HashiCorp Community Guidelines - https://www.hashicorp.com/community-guidelines.html. Behavior in violation of those guidelines may result in your removal from this mailing list.
GitHub Issues: https://github.com/hashicorp/vault/issues
IRC: #vault-tool on Freenode
---
You received this message because you are subscribed to the Google Groups "Vault" group.
To unsubscribe from this group and stop receiving emails from it, send an email to vault-tool+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/vault-tool/805261e0-f651-4cd2-9719-a544e6807d3e%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
Thanks David for the explanation.
There are two operation we do with Vault
Storing the secret
Retrieving the secret.
I am looking is some suggestion about the complete workflow where both the task (store and retrieve) can be performed in term of ACL ,getting authentication token, can retrieve particular secrete from authentication token .
We have following two workflow:
Docker ECS /deployment :
If will be really helpful if I can get some idea to implement above use case.
If we use App-id/user-id mode:
we need to mapped app-id-user-id and secret path at the time of storing the secret. Now how do we share these app-id and user-id to application . if they simply use this in application , then any one can see these value and it is similar to have plain text passwd
Document says : An out-of-band process run by security operators map unique user IDs to these app IDs. Example: when an instance is launched, a cloud-init system tells security operators a unique ID for this machine. This process can be scripted, but the key is that it is out-of-band and out of reach of configuration management. (Path: map/user-id/)
Does it means only some Admin guys can have permission to store the secret and put app-id in configuration file. this task will mapped app-id and policy (to access that particular secret)
and when application launch , it will contact one external service (via HTTP or REST call) to mapped app-id and user-id .
Issue is how we can sure the only valid application are making call to this external service?
Cubbyhole model:
i could not see that option when i auth backed tab in https://www.vaultproject.io/docs/auth/index.html , does it still support?
Although the link you shared have this information and document says :
how we can sure the only valid application are making call to this external service which are responsible to create temp and perm token?
—Thanks