Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow aws engine to create orphaned credentials #26641

Open
Shocktrooper opened this issue Apr 25, 2024 · 0 comments
Open

Allow aws engine to create orphaned credentials #26641

Shocktrooper opened this issue Apr 25, 2024 · 0 comments

Comments

@Shocktrooper
Copy link

Problem
I ran into an issue where I kept having AWS iam_user credentials generated by vault expire before their TTL was reached which was about 3 mins after creation when the TTL on the lease for the credentials was 1 hour. This was very hard to track down and was counter intuitive to what the TTL represented on the lease. I eventually found out that the generated credentials are tied to the TTL of the vault role that generated them. For security purposes we want to have a low TTL on the actual role an end user or service gets but have a larger TTL for the generated/retrieved credentials. It appears that this is not the case and the generated/retrieved credentials are limited to the max TTL of the token that generated them.

It appears that someone else has also ran into this same exact issue and solved this by increasing the max TTL on the role used for credential generation. We would not like to do this if possible for security purposes.

Solution
I would like to introduce the ability to orphan the credentials retrieved/generated from the parent role. This would allow for the TTL of the generated/retrieved credentials to actually be independent and work as one would think. This option already exists when creating a vault token itself and would be appreciated if this option could also exist for secret engine credentials.

alternatives
The only alternative that I have considered is making the parent roles TTL as large as the max of the generated/retrieved credentials which we would like to avoid if possible for security purposes.

Additional context
References:

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants