debian-mirror-gitlab/doc/integration/vault.md

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

161 lines
5.5 KiB
Markdown
Raw Normal View History

2020-01-01 13:55:28 +05:30
---
2022-01-26 12:08:38 +05:30
stage: Configure
group: Configure
2022-11-25 23:54:43 +05:30
info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/product/ux/technical-writing/#assignments
2020-01-01 13:55:28 +05:30
---
2021-11-18 22:05:49 +05:30
# Vault Authentication with GitLab OpenID Connect **(FREE)**
2020-01-01 13:55:28 +05:30
[Vault](https://www.vaultproject.io/) is a secrets management application offered by HashiCorp.
2022-11-25 23:54:43 +05:30
It allows you to store and manage sensitive information such as secret environment
variables, encryption keys, and authentication tokens.
2020-01-01 13:55:28 +05:30
2022-11-25 23:54:43 +05:30
Vault offers Identity-based Access, which means Vault users can authenticate
through several of their preferred cloud providers.
2020-01-01 13:55:28 +05:30
2022-11-25 23:54:43 +05:30
The following content explains how Vault users can authenticate themselves through
GitLab by using our OpenID authentication feature.
2020-01-01 13:55:28 +05:30
2022-11-25 23:54:43 +05:30
## Prerequisites
2021-03-11 19:13:27 +05:30
2023-01-13 00:05:48 +05:30
1. [Install Vault](https://developer.hashicorp.com/vault/docs/install).
2022-11-25 23:54:43 +05:30
1. Run Vault.
2020-04-08 14:13:33 +05:30
2022-11-25 23:54:43 +05:30
## Get the OpenID Connect client ID and secret from GitLab
2020-01-01 13:55:28 +05:30
2022-11-25 23:54:43 +05:30
First you must create a GitLab application to obtain an application ID and secret
for authenticating into Vault. To do this, sign in to GitLab and follow these steps:
2020-01-01 13:55:28 +05:30
2023-04-23 21:23:45 +05:30
1. In the upper-right corner, select your avatar.
2022-11-25 23:54:43 +05:30
1. Select **Edit profile**.
1. On the left sidebar, select **Applications**.
2023-01-13 00:05:48 +05:30
1. Fill out the application **Name** and [**Redirect URI**](https://developer.hashicorp.com/vault/docs/auth/jwt#redirect-uris).
2022-11-25 23:54:43 +05:30
1. Select the **OpenID** scope.
1. Select **Save application**.
1. Copy the **Client ID** and **Client Secret**, or keep the page open for reference.
2020-01-01 13:55:28 +05:30
2022-11-25 23:54:43 +05:30
![GitLab OAuth provider](img/gitlab_oauth_vault_v12_6.png)
2020-01-01 13:55:28 +05:30
2022-11-25 23:54:43 +05:30
## Enable OpenID Connect on Vault
2020-01-01 13:55:28 +05:30
2022-11-25 23:54:43 +05:30
OpenID Connect (OIDC) is not enabled in Vault by default.
2020-01-01 13:55:28 +05:30
2022-11-25 23:54:43 +05:30
To enable the OIDC authentication provider in Vault, open a terminal session
and run the following command:
2020-01-01 13:55:28 +05:30
2022-11-25 23:54:43 +05:30
```shell
vault auth enable oidc
```
2020-01-01 13:55:28 +05:30
2022-11-25 23:54:43 +05:30
You should see the following output in the terminal:
2020-01-01 13:55:28 +05:30
2022-11-25 23:54:43 +05:30
```plaintext
Success! Enabled oidc auth method at: oidc/
```
2020-01-01 13:55:28 +05:30
2022-11-25 23:54:43 +05:30
## Write the OIDC configuration
2020-01-01 13:55:28 +05:30
2022-11-25 23:54:43 +05:30
To give Vault the application ID and secret generated by GitLab and allow
Vault to authenticate through GitLab, run the following command in the terminal:
2020-01-01 13:55:28 +05:30
2022-11-25 23:54:43 +05:30
```shell
vault write auth/oidc/config \
oidc_discovery_url="https://gitlab.com" \
oidc_client_id="<your_application_id>" \
oidc_client_secret="<your_secret>" \
default_role="demo" \
bound_issuer="localhost"
```
2020-01-01 13:55:28 +05:30
2022-11-25 23:54:43 +05:30
Replace `<your_application_id>` and `<your_secret>` with the application ID
and secret generated for your app.
2020-01-01 13:55:28 +05:30
2022-11-25 23:54:43 +05:30
You should see the following output in the terminal:
2020-01-01 13:55:28 +05:30
2022-11-25 23:54:43 +05:30
```shell
Success! Data written to: auth/oidc/config
```
2020-01-01 13:55:28 +05:30
2022-11-25 23:54:43 +05:30
## Write the OIDC role configuration
2020-01-01 13:55:28 +05:30
2023-01-13 00:05:48 +05:30
You must tell Vault the [**Redirect URIs**](https://developer.hashicorp.com/vault/docs/auth/jwt#redirect-uris)
2022-11-25 23:54:43 +05:30
and scopes given to GitLab when you created the application.
2021-04-29 21:17:54 +05:30
2022-11-25 23:54:43 +05:30
Run the following command in the terminal:
```shell
vault write auth/oidc/role/demo -<<EOF
{
"user_claim": "sub",
"allowed_redirect_uris": "<your_vault_instance_redirect_uris>",
"bound_audiences": "<your_application_id>",
"oidc_scopes": "<openid>",
"role_type": "oidc",
"policies": "demo",
"ttl": "1h",
"bound_claims": { "groups": ["<yourGroup/yourSubgrup>"] }
}
EOF
```
Replace:
- `<your_vault_instance_redirect_uris>` with redirect URIs that match where your
Vault instance is running.
- `<your_application_id>` with the application ID generated for your app.
2020-01-01 13:55:28 +05:30
2022-11-25 23:54:43 +05:30
The `oidc_scopes` field must include `openid`.
2020-01-01 13:55:28 +05:30
2022-11-25 23:54:43 +05:30
This configuration is saved under the name of the role you are creating. In this
example, we are creating a `demo` role.
2020-04-08 14:13:33 +05:30
2022-11-25 23:54:43 +05:30
WARNING:
If you're using a public GitLab instance, such as GitLab.com, you must specify
the `bound_claims` to allow access only to members of your group or project.
Otherwise, anyone with a public account can access your Vault instance.
2020-04-08 14:13:33 +05:30
2022-11-25 23:54:43 +05:30
## Sign in to Vault
2020-01-01 13:55:28 +05:30
2022-11-25 23:54:43 +05:30
1. Go to your Vault UI. For example: [http://127.0.0.1:8200/ui/vault/auth?with=oidc](http://127.0.0.1:8200/ui/vault/auth?with=oidc).
1. If the `OIDC` method is not selected, open the dropdown list and select it.
1. Select **Sign in With GitLab**, which opens a modal window:
2020-01-01 13:55:28 +05:30
2022-11-25 23:54:43 +05:30
![Sign into Vault with GitLab](img/sign_into_vault_with_gitlab_v12_6.png)
2020-01-01 13:55:28 +05:30
2023-03-17 16:20:25 +05:30
1. To allow Vault to sign in through GitLab, select **Authorize**. This redirects you back to your Vault UI as an authenticated user.
2020-01-01 13:55:28 +05:30
2022-11-25 23:54:43 +05:30
![Authorize Vault to connect with GitLab](img/authorize_vault_with_gitlab_v12_6.png)
## Sign in using the Vault CLI (optional)
2023-01-13 00:05:48 +05:30
You can also sign into Vault using the [Vault CLI](https://developer.hashicorp.com/vault/docs/commands).
2022-11-25 23:54:43 +05:30
1. To sign in with the role configuration you created in the previous example,
run the following command in your terminal:
2020-01-01 13:55:28 +05:30
2020-04-08 14:13:33 +05:30
```shell
vault login -method=oidc port=8250 role=demo
```
2020-01-01 13:55:28 +05:30
2022-11-25 23:54:43 +05:30
This command sets:
- `role=demo` so Vault knows which configuration we'd like to sign in with.
- `-method=oidc` to set Vault to use the `OIDC` sign-in method.
- `port=8250` to set the port that GitLab should redirect to. This port
number must match the port given to GitLab when listing
2023-01-13 00:05:48 +05:30
[Redirect URIs](https://developer.hashicorp.com/vault/docs/auth/jwt#redirect-uris).
2020-01-01 13:55:28 +05:30
2022-11-25 23:54:43 +05:30
After running this command, you should see a link in the terminal.
2020-01-01 13:55:28 +05:30
2022-11-25 23:54:43 +05:30
1. Open this link in a web browser:
2020-01-01 13:55:28 +05:30
2020-04-08 14:13:33 +05:30
![Signed into Vault via OIDC](img/signed_into_vault_via_oidc_v12_6.png)
2020-01-01 13:55:28 +05:30
2022-11-25 23:54:43 +05:30
You should see in the terminal:
2020-01-01 13:55:28 +05:30
2020-04-08 14:13:33 +05:30
```plaintext
Success! You are now authenticated. The token information displayed below
is already stored in the token helper. You do NOT need to run "vault login"
again. Future Vault requests will automatically use this token.
```