-
Notifications
You must be signed in to change notification settings - Fork 0
Setting up a Hashicorp Vault
The private/public key pairs used by Tessera can be stored in and retrieved from a key vault, preventing the need to store the keys locally.
This page details how to set up and configure a Hashicorp Vault for use with Tessera.
The Hashicorp Vault Getting Started documentation provides much of the information needed to get started. The following section goes over some additional considerations when running Tessera with Vault.
When running in production situations it is advised to configure the Vault server for 2-way (mutual) TLS communication. Tessera also supports 1-way TLS and unsecured (no TLS) communications with a Vault server.
An example configuration for the Vault listener to use 2-way TLS is shown below. This can be included as part of the .hcl
used when starting the Vault server:
listener "tcp" {
tls_min_version = "tls12"
tls_cert_file = "/path/to/server.crt"
tls_key_file = "/path/to/server.key"
tls_require_and_verify_client_cert = "true"
tls_client_ca_file = "/path/to/client-ca.crt"
}
Tessera directly supports the AppRole auth method. If required, other auth methods can be used by logging in outside of Tessera (e.g. using the HTTP API) and providing the resulting vault token to Tessera. See the Enabling Tessera to use the vault section below for more information.
When using AppRole, Tessera assumes the default auth path to be approle
, however this value can be overwritten. See Keys for more information.
To be able to carry out all possible interactions with a Vault, Tessera requires the following policy capabilities: ["create", "update", "read"]
. A subset of these capabilities can be configured if not all functionality is required.
Tessera can read and write keys to the following secret engine type:
The K/V Version 2 secret engine supports versioning of secrets, however only a limited number of versions are retained. This number can be changed as part of the Vault configuration process.
If using a Hashicorp Vault, Tessera requires certain environment variables to be set depending on the auth method being used.
-
If using the AppRole auth method, set:
HASHICORP_ROLE_ID
HASHICORP_SECRET_ID
These credentials are obtained as outlined in the AppRole documentation. Tessera will use these credentials to authenticate with Vault.
-
If using the root token or you already have a token due to authorising with an alternative method, set:
HASHICORP_TOKEN
If using TLS additional environment variables must be set. See Keys for more information as well as details of the Tessera configuration required to retrieve keys from a Vault.