mirror of
https://github.com/optim-enterprises-bv/vault.git
synced 2025-11-02 19:47:54 +00:00
Improve documentation of token renewal
This commit is contained in:
@@ -82,8 +82,9 @@ Usage: vault token-create [options]
|
|||||||
This token will be created as a child of your token. The created token
|
This token will be created as a child of your token. The created token
|
||||||
will inherit your policies, or can be assigned a subset of your policies.
|
will inherit your policies, or can be assigned a subset of your policies.
|
||||||
|
|
||||||
A lease can also be associated with the token. If a lease is associated,
|
A lease can also be associated with the token. If a lease is not associated
|
||||||
it will expire after that amount of time unless it is renewed.
|
with the token, then it cannot be renewed. And if a lease is associated with
|
||||||
|
the token, it will expire after that amount of time unless it is renewed.
|
||||||
|
|
||||||
Metadata associated with the token (specified with "-metadata") is
|
Metadata associated with the token (specified with "-metadata") is
|
||||||
written to the audit log when the token is used.
|
written to the audit log when the token is used.
|
||||||
@@ -103,7 +104,8 @@ Token Options:
|
|||||||
is a non-security sensitive value used to help
|
is a non-security sensitive value used to help
|
||||||
identify created secrets, i.e. prefixes.
|
identify created secrets, i.e. prefixes.
|
||||||
|
|
||||||
-lease="1h" Lease to associate with the token.
|
-lease="1h" Lease to associate with the token. This option enables
|
||||||
|
the tokens to be renewable.
|
||||||
|
|
||||||
-metadata="key=value" Metadata to associate with the token. This shows
|
-metadata="key=value" Metadata to associate with the token. This shows
|
||||||
up in the audit log. This can be specified multiple
|
up in the audit log. This can be specified multiple
|
||||||
|
|||||||
@@ -58,7 +58,7 @@ func (c *TokenRenewCommand) Run(args []string) int {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (c *TokenRenewCommand) Synopsis() string {
|
func (c *TokenRenewCommand) Synopsis() string {
|
||||||
return "Renew an auth token"
|
return "Renew an auth token if there is an associated lease"
|
||||||
}
|
}
|
||||||
|
|
||||||
func (c *TokenRenewCommand) Help() string {
|
func (c *TokenRenewCommand) Help() string {
|
||||||
@@ -66,6 +66,7 @@ func (c *TokenRenewCommand) Help() string {
|
|||||||
Usage: vault token-renew [options] token [increment]
|
Usage: vault token-renew [options] token [increment]
|
||||||
|
|
||||||
Renew an auth token, extending the amount of time it can be used.
|
Renew an auth token, extending the amount of time it can be used.
|
||||||
|
Token is renewable only if there is a lease associated with it.
|
||||||
|
|
||||||
This command is similar to "renew", but "renew" is only for lease IDs.
|
This command is similar to "renew", but "renew" is only for lease IDs.
|
||||||
This command is only for tokens.
|
This command is only for tokens.
|
||||||
|
|||||||
@@ -558,7 +558,8 @@ func (ts *TokenStore) handleCreate(
|
|||||||
LeaseOptions: logical.LeaseOptions{
|
LeaseOptions: logical.LeaseOptions{
|
||||||
TTL: leaseDuration,
|
TTL: leaseDuration,
|
||||||
GracePeriod: leaseDuration / 10,
|
GracePeriod: leaseDuration / 10,
|
||||||
Renewable: leaseDuration > 0,
|
// Tokens are renewable only if user provides lease duration
|
||||||
|
Renewable: leaseDuration > 0,
|
||||||
},
|
},
|
||||||
ClientToken: te.ID,
|
ClientToken: te.ID,
|
||||||
},
|
},
|
||||||
@@ -698,7 +699,7 @@ const (
|
|||||||
tokenBackendHelp = `The token credential backend is always enabled and builtin to Vault.
|
tokenBackendHelp = `The token credential backend is always enabled and builtin to Vault.
|
||||||
Client tokens are used to identify a client and to allow Vault to associate policies and ACLs
|
Client tokens are used to identify a client and to allow Vault to associate policies and ACLs
|
||||||
which are enforced on every request. This backend also allows for generating sub-tokens as well
|
which are enforced on every request. This backend also allows for generating sub-tokens as well
|
||||||
as revocation of tokens.`
|
as revocation of tokens. The tokens are renewable if associated with a lease.`
|
||||||
tokenCreateHelp = `The token create path is used to create new tokens.`
|
tokenCreateHelp = `The token create path is used to create new tokens.`
|
||||||
tokenLookupHelp = `This endpoint will lookup a token and its properties.`
|
tokenLookupHelp = `This endpoint will lookup a token and its properties.`
|
||||||
tokenRevokeHelp = `This endpoint will delete the token and all of its child tokens.`
|
tokenRevokeHelp = `This endpoint will delete the token and all of its child tokens.`
|
||||||
|
|||||||
@@ -285,8 +285,9 @@ of the header should be "X-Vault-Token" and the value should be the token.
|
|||||||
<dl class="api">
|
<dl class="api">
|
||||||
<dt>Description</dt>
|
<dt>Description</dt>
|
||||||
<dd>
|
<dd>
|
||||||
Renews a lease associated with a token. This is used to prevent
|
Renews a lease associated with a token. This is used to prevent the
|
||||||
the expiration of a token, and the automatic revocation of it.
|
expiration of a token, and the automatic revocation of it. Token
|
||||||
|
renewal is possible only if there is a lease associated with it.
|
||||||
</dd>
|
</dd>
|
||||||
|
|
||||||
<dt>Method</dt>
|
<dt>Method</dt>
|
||||||
|
|||||||
@@ -96,4 +96,4 @@ how leasing is implemented.
|
|||||||
|
|
||||||
And just like secrets, identities can be renewed without having to
|
And just like secrets, identities can be renewed without having to
|
||||||
completely reauthenticate. Just use `vault token-renew <token>` with the
|
completely reauthenticate. Just use `vault token-renew <token>` with the
|
||||||
token associated with your identity to renew it.
|
leased token associated with your identity to renew it.
|
||||||
|
|||||||
@@ -49,8 +49,9 @@ the same way as [leases for secrets](/docs/concepts/lease.html). After
|
|||||||
the lease period is up, the token will no longer function. In addition
|
the lease period is up, the token will no longer function. In addition
|
||||||
to no longer functioning, Vault will revoke it.
|
to no longer functioning, Vault will revoke it.
|
||||||
|
|
||||||
In order to avoid your token being revoked, the `vault token-renew`
|
If a lease is associated with the token, in order to avoid your token being
|
||||||
command should be used to renew the lease on the token periodically.
|
revoked, the `vault token-renew` command should be periodically used to renew
|
||||||
|
the lease.
|
||||||
|
|
||||||
After a token is revoked, all of the secrets in use by that token will
|
After a token is revoked, all of the secrets in use by that token will
|
||||||
also be revoked. Therefore, if a user requests AWS access keys, for example,
|
also be revoked. Therefore, if a user requests AWS access keys, for example,
|
||||||
|
|||||||
@@ -60,6 +60,7 @@ All other commands:
|
|||||||
init Initialize a new Vault server
|
init Initialize a new Vault server
|
||||||
key-status Provides information about the active encryption key
|
key-status Provides information about the active encryption key
|
||||||
mount Mount a logical backend
|
mount Mount a logical backend
|
||||||
|
mount-tune Tune mount configuration parameters
|
||||||
mounts Lists mounted backends in Vault
|
mounts Lists mounted backends in Vault
|
||||||
policies List the policies on the server
|
policies List the policies on the server
|
||||||
policy-delete Delete a policy from the server
|
policy-delete Delete a policy from the server
|
||||||
@@ -68,8 +69,9 @@ All other commands:
|
|||||||
remount Remount a secret backend to a new path
|
remount Remount a secret backend to a new path
|
||||||
rotate Rotates the backend encryption key used to persist data
|
rotate Rotates the backend encryption key used to persist data
|
||||||
seal Seals the vault server
|
seal Seals the vault server
|
||||||
|
ssh Initiate a SSH session
|
||||||
token-create Create a new auth token
|
token-create Create a new auth token
|
||||||
token-renew Renew an auth token
|
token-renew Renew an auth token if there is an associated lease
|
||||||
token-revoke Revoke one or more auth tokens
|
token-revoke Revoke one or more auth tokens
|
||||||
unmount Unmount a secret backend
|
unmount Unmount a secret backend
|
||||||
unseal Unseals the vault server
|
unseal Unseals the vault server
|
||||||
|
|||||||
Reference in New Issue
Block a user