Skip to content

Commit b64a818

Browse files
authored
Merge pull request #291113 from ghugo/gagehugo/credential-rotation
Add details to credential rotation guide
2 parents 66d261b + 479a838 commit b64a818

File tree

1 file changed

+27
-1
lines changed

1 file changed

+27
-1
lines changed

articles/operator-nexus/howto-credential-rotation.md

Lines changed: 27 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,11 +34,37 @@ The Operator Nexus Platform offers a managed credential rotation process that au
3434
- Console User SSH keys for emergency access
3535
- Local path storage
3636

37-
When a new Cluster is created, the credentials are automatically rotated during deployment. The managed credential process then automatically rotates these credentials periodically based on the credential type. The updated credentials are written to the key vault associated with the Cluster resource. With the 2024-07-01-GA API, the credential rotation status is available on the Bare Metal Machine or Storage Appliance resources in the `secretRotationStatus` data construct for each of the rotated credentials.
37+
When a new Cluster is created, the credentials are automatically rotated during deployment. The managed credential process then automatically rotates these credentials periodically based on the credential type. The updated credentials are written to the key vault associated with the Cluster resource.
3838

3939
> [!NOTE]
4040
> The introduction of this capability enables auto-rotation for existing instances. If any of the supported credentials have not been rotated within the expected rotation time period, they will be rotated during the management upgrade.
4141
42+
With the 2024-07-01-GA API, the credential rotation status is available on the Bare Metal Machine or Storage Appliance resources in the `secretRotationStatus` data construct for each of the rotated credentials.
43+
44+
One example of this `secretRotationStatus` looks like:
45+
```
46+
"secretRotationStatus": [
47+
{
48+
"lastRotationTime": "2024-10-30T17:48:23Z",
49+
"rotationPeriodDays": 14,
50+
"secretArchiveReference": {
51+
"keyVaultId": "<KV Resource ID>",
52+
"secretName": "YYYYYYYYYYYYYYYYYYYYYY-storage-appliance-credential-manager-ZZZZZZZ",
53+
"secretVersion": "XXXXXXXXXXXXXX"
54+
},
55+
"secretType": "Bare Metal Machine Identity - console"
56+
},
57+
```
58+
59+
In the `secretRotationStatus` object, the following fields provide context to the state of the last rotation:
60+
61+
- `lastRotationTime`: The timestamp in UTC of the previous successful rotation.
62+
- `rotationPeriodDays`: The number in days the Credential Manager service is scheduled to rotate this credential. This value isn't remaining days from the `lastRotatedTime` since rotation can be delayed, but how many days on a schedule the service rotates a particular credential.
63+
- `secretArchiveReference`: A reference to the Key Vault that the credential is stored. It contains the ID of the key vault, the secret name of the stored credential, and the version of the secret that was previously rotated.
64+
65+
>[!CAUTION]
66+
> If a credential is changed on a device outside of the automatic credential rotation service, the next rotation will likely fail due to the secret not being known by the software. This prevents further automated rotation and a [baremetal machine replace](./howto-baremetal-functions.md) is required to address manually changed credentials.
67+
4268
Operator Nexus also provides a service for preemptive rotation of the above Platform credentials. This service is available to customers upon request through a support ticket. Credential rotation for Operator Nexus Fabric devices also requires a support ticket. Instructions for generating a support request are described in the next section.
4369

4470
## Create a support request

0 commit comments

Comments
 (0)