Hi Becca,
--
I do not know if I am explaining the issue I am facing correctly to you, let me reiterate the steps and let me know if you got this.
VAULT CLI STEPS [Using Command Prompt on Windows 10]
Step 1: Starting VAULT Dev Server with token-id ="root"
- vault server -dev -dev-root-token-id="root"
Step 2: Setting VAULT_ADDR
Step 3: Enable AppRole auth method
- vault auth enable approle
Step 4: Create policies [adminpolicy],[provisionerpolicy],[apppolicy]
- vault policy write adminpolicy "C:\Project\IOC\2018\Vault Policies\admin-policy.hcl"
- vault policy write provisionerpolicy "C:\Project\IOC\2018\Vault Policies\provisioner-policy.hcl"
- vault policy write apppolicy "C:\Project\IOC\2018\Vault Policies\apppolicy-pol.hcl"
Step 5: Create a new AppRole [testapprole]
- vault write auth/approle/role/testapprole secret_id_ttl=10m token_num_uses=10 token_ttl=20m token_max_ttl=30m secret_id_num_uses=40
Step 6: Attach policy [adminpolicy],[provisionerpolicy],[apppolicy] to [testapprole] AppRole
- vault write auth/approle/role/testapprole policies="adminpolicy, provisionerpolicy, apppolicy"
Step 7: Read the [testapprole] AppRole to verify if [adminpolicy],[provisionerpolicy],[apppolicy] policies are attached
- vault read auth/approle/role/testapprole
Step 8: Creating Secret [AppSettingKey=somesecretvalue] at secret/aws/us-east-1/rcd/servicing/sandbox
- vault kv put secret/aws/us-east-1/rcd/servicing/sandbox AppSettingKey=somesecretvalue
Step 9: Get Role ID and Secret ID for [testapprole] approle
- vault read auth/approle/role/testapprole/role-id -- to be used in Fiddler to make request
- vault write -f auth/approle/role/testapprole/secret-id -- to be used in Fiddler to make request
FIDDLER STEPS
{
"role_id":"b4f18e75-7c7c-2c60-ab82-2d58bccb9fba", -- Getting this from Vault CLI Step 9:
"secret_id":"957bceca-8953-d19b-3120-b79392975ad4" -- Getting this from Vault CLI Step 9:
}
Response Received:
{
"request_id": "7e8c03cc-492d-0ce5-770f-15cca97c54d1",
"lease_id": "",
"renewable": false,
"lease_duration": 0,
"data": null,
"wrap_info": null,
"warnings": null,
"auth": {
"client_token": "c1019f2c-6873-77a8-be7c-8c2a7178bb4a",
"accessor": "09bc2935-d85f-54ac-0e37-a253b1792ba8",
"policies": [
"adminpolicy",
"apppolicy",
"default",
"provisionerpolicy"
],
"metadata": {
"role_name": "testapprole"
},
"lease_duration": 1200,
"renewable": true,
"entity_id": "434c464c-4172-d737-f077-4a1f64c2c239"
}
}
User-Agent: Fiddler
Host: 127.0.0.1:8200
Content-Length: 0
X-Vault-Token: c1019f2c-6873-77a8-be7c-8c2a7178bb4a
Response Received:
{
"request_id": "c55f3dbe-fb86-33c9-ead3-86fad99f4e26",
"lease_id": "",
"renewable": false,
"lease_duration": 0,
"data": null,
"wrap_info": null,
"warnings": [