@@ -34,7 +34,7 @@ The secrets engine has three primary features:
34
34
to generate passwords:
35
35
36
36
``` sh
37
- $ vault write auth/ ldap/config \
37
+ $ vault write ldap/config \
38
38
binddn=$USERNAME \
39
39
bindpass=$PASSWORD \
40
40
url=ldaps://138.91.247.105
@@ -45,7 +45,7 @@ The secrets engine has three primary features:
45
45
3 . Rotate the root password so only Vault knows the credentials:
46
46
47
47
``` sh
48
- $ vault write -f auth/ ldap/rotate-root
48
+ $ vault write -f ldap/rotate-root
49
49
```
50
50
51
51
Note: it's not possible to retrieve the generated password once rotated by Vault.
@@ -80,7 +80,7 @@ Generated passwords must be 8 characters or less to support RACF. The length of
80
80
password can be configured using a [ password policy] ( /vault/docs/concepts/password-policies ) :
81
81
82
82
``` bash
83
- $ vault write auth/ ldap/config \
83
+ $ vault write ldap/config \
84
84
binddn=$USERNAME \
85
85
bindpass=$PASSWORD \
86
86
url=ldaps://138.91.247.105 \
@@ -94,7 +94,7 @@ For managing Active Directory instances, the secret engine must be configured to
94
94
schema ` ad ` .
95
95
96
96
``` bash
97
- $ vault write auth/ ldap/config \
97
+ $ vault write ldap/config \
98
98
binddn=$USERNAME \
99
99
bindpass=$PASSWORD \
100
100
url=ldaps://138.91.247.105 \
@@ -109,7 +109,7 @@ $ vault write auth/ldap/config \
109
109
Password rotation settings will be managed by this role.
110
110
111
111
``` sh
112
- $ vault write auth/ ldap/static-role/hashicorp \
112
+ $ vault write ldap/static-role/hashicorp \
113
113
dn=' uid=hashicorp,ou=users,dc=hashicorp,dc=com' \
114
114
username=' hashicorp' \
115
115
rotation_period=" 24h"
@@ -118,7 +118,7 @@ $ vault write auth/ldap/config \
118
118
2 . Request credentials for the "hashicorp" role:
119
119
120
120
``` sh
121
- $ vault read auth/ ldap/static-cred/hashicorp
121
+ $ vault read ldap/static-cred/hashicorp
122
122
```
123
123
124
124
### Password rotation
@@ -155,7 +155,7 @@ rotated prior to deleting the role or revoking access to the static role.
155
155
Dynamic credentials can be configured by calling the ` /role/:role_name ` endpoint:
156
156
157
157
``` bash
158
- $ vault write auth/ ldap/role/dynamic-role \
158
+ $ vault write ldap/role/dynamic-role \
159
159
creation_ldif=@/path/to/creation.ldif \
160
160
deletion_ldif=@/path/to/deletion.ldif \
161
161
rollback_ldif=@/path/to/rollback.ldif \
@@ -169,7 +169,7 @@ executed if the creation fails for any reason. This ensures any entities are rem
169
169
To generate credentials:
170
170
171
171
``` bash
172
- $ vault read auth/ ldap/creds/dynamic-role
172
+ $ vault read ldap/creds/dynamic-role
173
173
Key Value
174
174
--- -----
175
175
lease_id ldap/creds/dynamic-role/HFgd6uKaDomVMvJpYbn9q4q5
@@ -283,7 +283,7 @@ to an AD server.
283
283
$ vault secrets enable ldap
284
284
Success! Enabled the ad secrets engine at: ldap/
285
285
286
- $ vault write auth/ ldap/config \
286
+ $ vault write ldap/config \
287
287
binddn=$USERNAME \
288
288
bindpass=$PASSWORD \
289
289
url=ldaps://138.91.247.105 \
@@ -293,7 +293,7 @@ $ vault write auth/ldap/config \
293
293
Our next step is to designate a set of service accounts for check-out.
294
294
295
295
``` shell-session
296
- $ vault write auth/ ldap/library/accounting-team \
296
+ $ vault write ldap/library/accounting-team \
297
297
298
298
ttl=10h \
299
299
max_ttl=20h \
@@ -312,7 +312,7 @@ When a library of service accounts has been created, view their status at any ti
312
312
available or checked out.
313
313
314
314
``` shell-session
315
- $ vault read auth/ ldap/library/accounting-team/status
315
+ $ vault read ldap/library/accounting-team/status
316
316
Key Value
317
317
--- -----
318
318
[email protected] map[available:true]
322
322
To check out any service account that's available, simply execute:
323
323
324
324
``` shell-session
325
- $ vault write -f auth/ ldap/library/accounting-team/check-out
325
+ $ vault write -f ldap/library/accounting-team/check-out
326
326
Key Value
327
327
--- -----
328
328
lease_id ldap/library/accounting-team/check-out/EpuS8cX7uEsDzOwW9kkKOyGW
@@ -336,7 +336,7 @@ If the default `ttl` for the check-out is higher than needed, set the check-out
336
336
for a shorter time by using:
337
337
338
338
``` shell-session
339
- $ vault write auth/ ldap/library/accounting-team/check-out ttl=30m
339
+ $ vault write ldap/library/accounting-team/check-out ttl=30m
340
340
Key Value
341
341
--- -----
342
342
lease_id ldap/library/accounting-team/check-out/gMonJ2jB6kYs6d3Vw37WFDCY
@@ -353,7 +353,7 @@ check it back in."
353
353
If no service accounts are available for check-out, Vault will return a 400 Bad Request.
354
354
355
355
``` shell-session
356
- $ vault write -f auth/ ldap/library/accounting-team/check-out
356
+ $ vault write -f ldap/library/accounting-team/check-out
357
357
Error writing data to ldap/library/accounting-team/check-out: Error making API request.
358
358
359
359
URL: POST http://localhost:8200/v1/ldap/library/accounting-team/check-out
@@ -380,7 +380,7 @@ ends.
380
380
To check a service account back in for others to use, call:
381
381
382
382
``` shell-session
383
- $ vault write -f auth/ ldap/library/accounting-team/check-in
383
+ $ vault write -f ldap/library/accounting-team/check-in
384
384
Key Value
385
385
--- -----
386
386
@@ -390,7 +390,7 @@ Most of the time this will just work, but if multiple service accounts are check
390
390
caller, Vault will need to know which one(s) to check in.
391
391
392
392
``` shell-session
393
- $ vault write auth/ ldap/library/accounting-team/check-in [email protected]
393
+ $ vault write ldap/library/accounting-team/check-in [email protected]
394
394
Key Value
395
395
--- -----
396
396
@@ -405,7 +405,7 @@ Vault will check it back in automatically when the `ttl` expires. However, if th
405
405
service accounts can be forcibly checked in by a highly privileged user through:
406
406
407
407
``` shell-session
408
- $ vault write -f auth/ ldap/library/manage/accounting-team/check-in
408
+ $ vault write -f ldap/library/manage/accounting-team/check-in
409
409
Key Value
410
410
--- -----
411
411
0 commit comments