We have two admin policies, full admin (for break glass scenarios) with path "*" and a more fine grained limited admin policy for regular administration. The limited admin policy is similar to one specified here:
https://www.hashicorp.com/resources/policies-vault#admin. We added the following to the limited admin policy to make it work with Vault namespaces:
# Manage namespaces
path "sys/namespaces/*" {
capabilities = ["create", "read", "update", "delete", "list", "sudo"]
}
However, with this I am only able to list and create namespaces at the root level. I am unable to access any of the child/nested namespaces. Also the UI doesn't render the namespace picker. Everything works great with the full admin policy.
Note this also works when I explicitly set the namespace path in the policy i.e.
# Manage namespaces
path "ns1/sys/namespaces/*" {
capabilities = ["create", "read", "update", "delete", "list", "sudo"]
}
# Manage namespaces
path "ns1/ns2/sys/namespaces/*" {
capabilities = ["create", "read", "update", "delete", "list", "sudo"]
}
AFAIK, wildcarding "*" only works at the end of the path?
We need the root admins to be able to access and manage child namespaces. Is there a way to accomplish this without using a rather dangerous full admin policy? We are on Vault 1.2.0