-
Notifications
You must be signed in to change notification settings - Fork 150
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support Cubbyhole to pass tokens #15
Comments
+1 That would be awesome! |
I'd like to point to the new response wrapping feature which might simplify solving this issue: https://www.vaultproject.io/docs/concepts/response-wrapping.html |
Response wrapping is using cubbyhole to store responses at
Does this make sense? I will also open a ticket to support wrapped cubbyhole responses but that's different from cubbyhole usage for authentication. |
Yes, that makes perfect sense. I'm not sure if it's relevant, but perhaps this method could be useful in determining whether the token has expired or already used:
|
We now support cubbyhole authentication to securely use tokens. Cubbyhole authentication uses Vault primitives to provide a secured authentication workflow. Cubbyhole authentication uses tokens as primary login method. An ephemeral token is used to obtain a second, login VaultToken from Vault's Cubbyhole secret backend. The login token is usually longer-lived and used to interact with Vault. The login token will be retrieved from a wrapped response stored at `/cubbyhole/response`. A wrapped token can be created with: vault token-create -wrap-ttl="10m" boostrap.yml: spring.cloud.vault: authentication: CUBBYHOLE token: (the wrapping token) Fixes gh-15.
Spring Cloud Vault Config allows configuration of a static token
spring.cloud.vault.token
. Storing the token allows lookup attacks: The static key can be retrieved from the configuration by unauthorized users and can be used to access Vault.Implementing a cubbyhole authentication for a short-lived (temporary) and long-lived (permanent) token can take advantage from token expiry. A short-lived token that allows a limited number of usages can be used by the application to obtain secrets from cubbyhole. The cubbyhole holds a long-lived token (or other credentials) which is used then to access Vault secrets.
Users could configure the short-lived token in
spring.cloud.vault.token
to obtain secrets from cubbyhole.This approach prevents lookup attacks once the short-term token expires and reveals configuration issues/accesses to Vault is the short-lived token was used to access Vault because an application is no longer able to start up using the temporary token.
The text was updated successfully, but these errors were encountered: