Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update Vault Azure Secrets docs for permanent deletion feature #17045

Merged
merged 3 commits into from
Sep 13, 2022

Conversation

dpowley
Copy link
Contributor

@dpowley dpowley commented Sep 7, 2022

Corresponds to hashicorp/vault-plugin-secrets-azure#104

That PR allows for permanent deletion of AzureAD apps and service principals that are created by the secrets engine. Traditionally, the Vault secrets engine does not permanently delete the service principals/apps from AzureAD when leases expire. Instead, the objects are placed in a "recycle bin," and they count toward the limit of AzureAD objects in a tenant (that limit ranges from 50k to 500k objects). So after 50k-500k leases, Vault hits the limit of objects in an Azure AD and causes all create operations on the tenant to fail.

Copy link
Member

@austingebauer austingebauer left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👍

@austingebauer
Copy link
Member

austingebauer commented Sep 8, 2022

Can you add a changelog entry for this? See the changelog directory for examples. You'd add the 17045.txt file for this.

@dpowley
Copy link
Contributor Author

dpowley commented Sep 8, 2022

Can you add a changelog entry for this? See the changelog directory for examples. You'd add the 17045.txt file for this.

Added!

changelog/17045.txt Outdated Show resolved Hide resolved
@calvn calvn added the docs label Sep 13, 2022
@calvn calvn merged commit b4e5411 into hashicorp:main Sep 13, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants