Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Switch to RBAC for KeyVault access #169

Closed
Pauwelz opened this issue Feb 16, 2023 · 3 comments
Closed

Switch to RBAC for KeyVault access #169

Pauwelz opened this issue Feb 16, 2023 · 3 comments
Assignees
Labels
enhancement New feature or request

Comments

@Pauwelz
Copy link
Contributor

Pauwelz commented Feb 16, 2023

We're currently using "Vault access policy" for the internal Invictus Keyvault, when switching to MI (#168) we can also change to using RBAC for this keyvault.

@Pauwelz Pauwelz added the enhancement New feature or request label Feb 16, 2023
@LaurentAerens LaurentAerens self-assigned this Mar 2, 2023
@GoutsmitSam
Copy link
Contributor

@Pauwelz This change has been finished, but @LaurentAerens has a concern that the Invictus KeyVault might be used by other (non-Invictus) applications/integrations as well, meaning that those applications will have to switch to using RBAC as well.

Do you have any knowledge of this being a widespread practice? Should we hold off rolling this out until we get some clarity on this?

@GoutsmitSam GoutsmitSam reopened this Sep 14, 2023
@pim-simons
Copy link
Contributor

@Pauwelz This change has been finished, but @LaurentAerens has a concern that the Invictus KeyVault might be used by other (non-Invictus) applications/integrations as well, meaning that those applications will have to switch to using RBAC as well.

Do you have any knowledge of this being a widespread practice? Should we hold off rolling this out until we get some clarity on this?

I have one or two customers where this is done as well.
For my customers this shouldn't be an issue since the functions that access the Invictus KeyVault are already running under a managed identity that has KeyVault access assigned to them on the subscription.

However, even if this was not the case and the customer would be impacted this is something they would immediately see during deployment of the new Invictus version over their DTAP environment and would be able to make the appropriate changes before moving this to production. So from my point of view this changing the Invictus KeyVault to RBAC should not result in production issues at customers.

Just my thoughts, interested in others 👍🏻

@GoutsmitSam
Copy link
Contributor

Update: the general consensus is that this should not be seen as a blocking issue. Any 'outside' connections to the Invictus KeyVault will get detected when installing the version, so can be handled at that point. I'll close this issue, and have asked the team to release this change.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

4 participants