Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Please add the access key age for non-EC2 Vault clusters and/or creation date to AWS Secrets Engine #18165

Open
allyunion opened this issue Nov 30, 2022 · 0 comments

Comments

@allyunion
Copy link

allyunion commented Nov 30, 2022

Is your feature request related to a problem? Please describe.
Vault does not know how old the access key is when using the aws secrets engine for an on-premise Vault cluster. It should be noted that if Vault obtains credentials from an IAM instance role profile, I don't know if this is applicable, or that Vault would simply ask STS for new credentials.

Describe the solution you'd like
Although the AWS console has the information about the age of the access key, it would be better to cache this information in vault and either have vault understand that the "root IAM credential" it has needs to be rotated out regularly based on a set policy or allow something like Terraform to be able to read the access key age and issue a rotate-root command. Ultimately, knowing how old the "root IAM credential" is and having it rotate out frequently based on set configuration parameters would be great.

Describe alternatives you've considered
The only way around this is custom code with boto3 and Python hvac.

@allyunion allyunion changed the title Please add the access key age and/or creation date to AWS Secrets Engine Please add the access key age for non-EC2 Vault clusters and/or creation date to AWS Secrets Engine Nov 30, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants