Navigation Menu

Skip to content

puppycodes/vault-ui

 
 

Repository files navigation

Vault-UI

Run Status

A beautiful way to manage your secrets in Vault Landing Page

Secrets Management

Configuration

Configuration is accessed by clicking on the configuration cog on the login page. Configuration

Vault Endpoint

Users can enter in the full endpoint to Vault, including scheme. When running the docker image, it is possible to set the environment variables VAULT_URL_DEFAULT and VAULT_AUTH_DEFAULT. VAULT_URL_DEFAULT will set the default endpoint for users without needing them to enter one in the UI. VAULT_AUTH_DEFAULT will set the default authentication method type. Supported values are: GITHUB, TOKEN, LDAP, USERNAMEPASSWORD This defaults can be overridden if the user fills out the endpoint and auth method manually.

Authentication

Currently supported authentication backends:

Token authentication by header (SSO)

In some cases, users might want to use middleware to authenticate into Vault-UI for purposes like SSO. In this case, the VAULT_SUPPLIED_TOKEN_HEADER may be populated with the name of the header that contains a token to be used for authentication.

Secrets

Secrets Management

Secrets are now managed using the graphical josdejong/jsoneditor JSON editor. Schema validation is enforced on policies to aid the operator in writing correct syntax. New Secrets

Secrets also are accessible directly by key from a browser by navigating to the URI /secrets/<mount>/<namespace>/key. For example, if you have a generic secret key of /hello/world/vault using the generic mount secret, one can navigate to this directly through http://vault-ui.myorg.com/secrets/secret/hello/world/vault.

Root key bias

By default, secrets will display as their raw JSON value represented by the data field in the HTTP GET response metadata. However, users can apply a "Root Key" bias to the secrets through the settings page. The "Root Key" will be used when reading, creating and updating secrets such that the value displayed in the UI is the value stored at the "Root Key". For example, if the secret at secret/hello is { "value": "world" }, setting the "Root Key" to value will update the UI such that the secret will display as simply "world" instead of { "value": "world" }.

Policies

Policies are managed also using the josdejong/jsoneditor JSON editor. Currently, GitHub and raw Tokens are the only supported authentication backends for associated policies.

Token Management

Token Management

Users now have the ability to create and revoke tokens. Token Management

Response Wrapping

Vault-UI supports response-wrapping raw values. It currently does not support wrapping of existing secrets. Response Wrapping

Run

Vault-UI Docker images are automatically built using an automated build on Docker Hub. We encourage that versioned images are used for production. To run Vault-UI using the latest Docker image:

docker run -d \
-p 8000:8000 \
--name vault-ui \
djenriquez/vault-ui

Skip TLS Verification

In the case that you need to skip TLS verification, say for self-signed certs, you can run Vault-UI with the environment variable NODE_TLS_REJECT_UNAUTHORIZED=0:

docker run -d \
-p 8000:8000 \
-e NODE_TLS_REJECT_UNAUTHORIZED=0 \
--name vault-ui \
djenriquez/vault-ui

Development

With Docker

The command below will use Docker Compose to spin up a Vault dev server and a Vault UI server that you can log into with username "test" and password "test":

./run-docker-compose-dev

If major changes are made, be sure to run docker-compose build to rebuild dependencies.

Without Docker

The following will spin up a Vault UI server only. It will not set up Vault for you:

npm install

# If you do not have webpack installed globally
npm install -g webpack

npm start
webpack -w

Licensing

Vault-UI is licensed under BSD 2-Clause. See LICENSE for the full license text.

About

Vault-UI — A beautiful UI to manage your Vault, written in React

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • JavaScript 96.2%
  • CSS 2.4%
  • Other 1.4%