Commit Graph

1319 Commits

Author SHA1 Message Date
Becca Petrin
b12fa85c9b uppercase Vault in plugin doc (#4442) 2018-04-24 10:41:37 -07:00
Jeff Mitchell
87e54d12b2 Update audit text to make it clear that audit logs are for authenticated interactions 2018-04-23 10:49:32 -04:00
Malhar Vora
78aa4876eb Corrects description for mode option in ssh command (#4420)
Fixes #4375
2018-04-22 13:42:46 -04:00
Malhar Vora
7b2858b7a3 Correct typo in Kubernetes auth backend docs
Resolve small typo in Configuring Kubernetes section in Kubernetes Auth Backend
documentation.

Fixes #4417
2018-04-21 19:37:59 -07:00
Jeff Mitchell
bc0918a350 Add the ability to restrict token usage by IP. Add to token roles. (#4412)
Fixes #815
2018-04-21 10:49:16 -04:00
Alvin Huang
5d440fe618 remove redundant 'Vault' in approle docs (#4405) 2018-04-20 09:55:15 -04:00
Vishal Nayak
e6cc20d1e7 phys/consul: Allow tuning of session ttl and lock wait time (#4352)
* phys/consul: allow tuning of session ttl and lock wait time

* use parseutil

* udpate docs
2018-04-18 13:09:55 -04:00
Jeff Mitchell
80b17705a9 X-Forwarded-For (#4380) 2018-04-17 18:52:09 -04:00
Laura Uva
d4b5f94dfe Add mode to the examples under automation steps (#4374) 2018-04-17 13:47:41 -04:00
Jerome Cheng
06eae018a3 Fix indentation of code block in Consul Secrets Engine docs (#4350)
The indentation of the code block in the Consul Secrets Engine doc was
removed in #4224, but the closing backticks remained indented one level,
resulting in the block swallowing all text after it. Removing the
indentation from the closing backticks fixes this.
2018-04-13 09:55:35 -04:00
Peter Souter
0ac5933c24 Remove Enterprise Only flag (#4337) 2018-04-11 14:27:58 -04:00
Matthew Irish
e7801faf2a fix broken link (#4329) 2018-04-10 11:11:38 -05:00
Brian Kassouf
915e452c0d KV: Update 'versioned' naming to 'v2' (#4293)
* Update 'versioned' naming to 'v2'

* Make sure options are set

* Fix description of auth flag

* Review feedback
2018-04-09 09:39:32 -07:00
Chris Hoffman
295db4718f Root Credential Rotation Docs (#4312)
* updating root credential docs

* more docs updates

* more docs updates
2018-04-09 12:20:29 -04:00
Chris Hoffman
6492311767 remove token from curl request for login paths (#4303) 2018-04-06 18:10:59 -04:00
Andy Manoske
0b4adfd92f Update index.html.md 2018-04-05 15:16:28 -07:00
Seth Vargo
aec4a603b4 Rename Google things to say "Google", update telemetry (#4267) 2018-04-04 10:37:44 -04:00
Brian Kassouf
56274d854d Versioned K/V docs (#4259)
* Work on kv docs

* Add more kv docs

* Update kv docs

* More docs updates

* address some review coments
2018-04-03 23:22:41 -07:00
Roy Sindre Norangshol
3ddd3bd20c project is now project_id (#4251)
Verified both via vault CLI and direct curl'ing towards API endpoints.
2018-04-03 17:11:47 -04:00
Vishal Nayak
c052bb5ae2 move identity docs from ent docs to oss (#4235) 2018-04-01 13:59:43 -04:00
LeSuisse
885a6e754d Update usage of the deprecated generated-root command in the documentation (#4232) 2018-03-31 11:17:08 -04:00
Seth Vargo
e0fccbd55a Add HA support to the Google Cloud Storage backend (#4226) 2018-03-30 12:36:37 -04:00
Brian Shumate
721bcc6546 Update Consuls Secrets quick start (#4224)
- Fix typo in role name
- Drop ordered list formatting on get credential example
2018-03-30 10:46:05 -04:00
Jon Benson
12cd8bdeb6 Update mfa-totp.html.md (#4220) 2018-03-29 16:51:13 -04:00
Jeff Mitchell
4b45cb7f91 Merge branch 'master-oss' into 0.10-beta 2018-03-27 12:40:30 -04:00
vishalnayak
29ed7a383f docs: update aws ec2 auth step 2018-03-26 17:26:48 -04:00
Jeff Mitchell
1c2b610f3a Remove a few more vault.rocks usages 2018-03-26 15:02:22 -04:00
Wilhelmina Drengwitz
9b91032297 Add general recommendation for the api_addr config value (#4198)
We ran into some confusion about what we should be setting the api_addr config value to. I feel this general recommendation should nudge any others into a better understanding of what this value should point to.
2018-03-26 13:46:54 -04:00
Jeff Mitchell
43e9bcd948 Add more docs around list paths in policies.
CC #4199
2018-03-26 11:30:58 -04:00
Seth Vargo
04708d554c Drop vault.rocks (#4186) 2018-03-23 11:41:51 -04:00
Chris Hoffman
505f0ea495 adding Azure docs (#4185)
Adding Azure Auth Method docs
2018-03-22 18:28:42 -04:00
Jim Kalafut
c646f96786 Fix minor docs and help text issues (#4184) 2018-03-22 09:29:59 -04:00
Brian Kassouf
d51dc47070 Add kv backend (#4181) 2018-03-21 22:56:52 -04:00
emily
468cad19f3 Docs for Vault GCP secrets plugin (#4159) 2018-03-21 15:02:38 -04:00
Josh Soref
e43b76ef97 Spelling (#4119) 2018-03-20 14:54:10 -04:00
Jeff Mitchell
59c451d246 Explicitly call out that we use aes-256 gcm-96 for the barrier.
Fixes #2913
2018-03-19 19:53:12 -04:00
Roger Berlind
aabccd5fd2 Fixed broken k8s TokenReview API link (#4144) 2018-03-17 21:23:41 -04:00
immutability
b2f44f9867 Plugins need setcap too for syscall mlock (#4138) 2018-03-16 06:05:01 -07:00
Jim Kalafut
17ed6663f7 Fix description of parameter value globbing (#4131) 2018-03-14 17:03:00 -04:00
Edward Z. Yang
1adda15299 Vault user needed to use STS Federation Tokens (#4108)
If you try to use role authorization to get an STS token, you'll get this error:

* Error generating STS keys: AccessDenied: Cannot call GetFederationToken with session credentials
2018-03-14 10:24:29 -04:00
Malte
26d8b7f095 Fix typo in recommended vault auth iam policy (#4128)
The resource arn for the `sts:AssumeRole` action is missing a `:` for the region and therefore invalid.
2018-03-14 03:45:21 -04:00
Brian Shumate
f8324e9c2a Docs: grammatical clarification around community supported note (#4122) 2018-03-13 10:32:28 -04:00
Jeff Mitchell
0fec3965e1 Update text around default policy to make it clear that it is user-modifiable 2018-03-08 15:48:11 -05:00
Jim Kalafut
3024869fdc Fix instruction in installation docs (#4097) 2018-03-08 11:02:04 -05:00
Aleksandar
ceef3b60d8 Add the chunk_size optional parameter to gcs storage (#4060) 2018-03-05 08:32:48 -05:00
Mike
79a884fbe8 Correct endpoint's path in Doc (#4074)
Fix typo in endpoint's path
2018-03-05 07:41:53 -05:00
Jim Kalafut
9a16efe7db Change "mount" to "secrets enable" in docs 2018-03-02 12:54:28 -08:00
Joel Thompson
8a115c73d9 auth/aws: Allow lists in binds (#3907)
* auth/aws: Allow lists in binds

In the aws auth method, allow a number of binds to take in lists
instead of a single string value. The intended semantic is that, for
each bind type set, clients must match at least one of each of the bind
types set in order to authenticate.
2018-03-02 11:09:14 -05:00
Andy Manoske
d21cbe3687 Update index.html.md
Updated for Unbound
2018-02-28 16:20:54 -08:00
Jeff Mitchell
8f328c490a Fix broken link on Consul docs 2018-02-26 13:28:15 -05:00