Key Value--- -----token <token>token_accessor <token_accessor>token_duration 768htoken_renewable truetoken_policies [admin default read-only]token_meta_username <username>--
This mailing list is governed under the HashiCorp Community Guidelines - https://www.hashicorp.com/community-guidelines.html. Behavior in violation of those guidelines may result in your removal from this mailing list.
GitHub Issues: https://github.com/hashicorp/vault/issues
IRC: #vault-tool on Freenode
---
You received this message because you are subscribed to the Google Groups "Vault" group.
To unsubscribe from this group and stop receiving emails from it, send an email to vault-tool+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/vault-tool/48db8c2e-23d1-4962-8f38-f3775e2be652%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
path "secret/*" { policy = "read" }
# Manage auth methods broadly across Vaultpath "auth/*"{ capabilities = ["create", "read", "update", "delete", "list", "sudo"]}
# List, create, update, and delete auth methodspath "sys/auth/*"{ capabilities = ["create", "read", "update", "delete", "sudo"]}
# enable audit permissionspath "sys/audit/*"{ capabilities = ["create", "read", "update", "delete", "sudo", "list"]}
# enable secret permissionspath "secret/*"{ capabilities = ["create", "read", "update", "delete", "sudo", "list"]}
# read auth methodspath "sys/audit" { capabilities = ["list", "read", "sudo"]}
# enable stepdown permissions for stepping down a leaderpath "sys/step-down/*"{ capabilities = ["create", "read", "update", "delete", "sudo", "list"]}
# list step down permissionpath "sys/step-down" { capabilities = ["create", "update", "list", "read", "sudo"]}
# read auth methodspath "sys/auth" { capabilities = ["read"]}
path "auth/token/create" { capabilities = ["create", "read", "update", "list"]}
# List existing policiespath "sys/policy"{ capabilities = ["read"]}
# Create and manage ACL policies broadly across Vaultpath "sys/policy/*"{ capabilities = ["create", "read", "update", "delete", "list", "sudo"]}
# List, create, update, and delete key/value secretspath "secret/*"{ capabilities = ["create", "read", "update", "delete", "list", "sudo"]}
# Manage and manage secret engines broadly across Vault.path "sys/mounts/*"{ capabilities = ["create", "read", "update", "delete", "list", "sudo"]}
# Read health checkspath "sys/health"{ capabilities = ["read", "sudo"]}To view this discussion on the web visit https://groups.google.com/d/msgid/vault-tool/beca49c4-ccee-41cb-bc4a-4b444c7c8d1e%40googlegroups.com.
The read only policy is attached in the above post as well.
Thanks
--
This mailing list is governed under the HashiCorp Community Guidelines - https://www.hashicorp.com/community-guidelines.html. Behavior in violation of those guidelines may result in your removal from this mailing list.
GitHub Issues: https://github.com/hashicorp/vault/issues
IRC: #vault-tool on Freenode
---
You received this message because you are subscribed to the Google Groups "Vault" group.
To unsubscribe from this group and stop receiving emails from it, send an email to vault-tool+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/vault-tool/7691d4d5-0853-45aa-88ec-fbe2fa8add80%40googlegroups.com.