You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+32-2Lines changed: 32 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,6 +12,8 @@
12
12
1.[Description](#description)
13
13
1.[Setup](#setup)
14
14
1.[How it works](#how-it-works)
15
+
*[Puppet Function](#puppet-function)
16
+
*[Hiera Backend](#hiera-backend)
15
17
1.[How it's secure by default](#how-its-secure-by-default)
16
18
1.[Usage](#usage)
17
19
*[Embedding a secret in a file](#embedding-a-secret-in-a-file)
@@ -33,7 +35,9 @@ The module requires the following:
33
35
* Puppet Server running on a machine with Managed Service Identity ( MSI ) and assigned the appropriate permissions
34
36
to pull secrets from the vault. To learn more or get help with this please visit https://docs.microsoft.com/en-us/azure/active-directory/managed-service-identity/tutorial-windows-vm-access-nonaad
35
37
36
-
## How the function works
38
+
## How it works
39
+
40
+
### Puppet Function
37
41
38
42
This module contains a Puppet 4 function that allows you to securely retrieve secrets from Azure Key Vault. In order to get started simply call the function in your manifests passing in the required parameters:
39
43
@@ -53,7 +57,7 @@ In the above example the api_versions hash is important. It is pinning both of
53
57
* Instance Metadata Service Versions ( https://docs.microsoft.com/en-us/azure/virtual-machines/windows/instance-metadata-service )
54
58
* Vault Versions ( TBD )
55
59
56
-
##How the hiera backend works
60
+
### Hiera Backend
57
61
58
62
This module contains a Hiera 5 backend that allows you to securely retrieve secrets from Azure key vault and use them in hiera.
**NOTE: Retrieving a specific version of a secret is currently not available via the hiera backend**
235
239
240
+
### Retrieving a certificate
241
+
242
+
Azure Key Vault stores certificates "under-the-covers" as secrets. This means you retrieving certificates can be done using the same `azure_key_vault::secret`
243
+
function. One thing to keep in mind is that the certificate will be based64 encoded and will need to be decoded before usage to have a valid certificate file.
0 commit comments