-
Notifications
You must be signed in to change notification settings - Fork 12
Open
Labels
BoundaryBoundary-related issuesBoundary-related issuesVaultVault-related issuesVault-related issuesansibleansible-related issuesansible-related issuesenhancementNew feature or requestNew feature or requestterraformthis regards Terraform related stuffthis regards Terraform related stuff
Description
According to a quick start tutorial on Hashicorp's gituhb page a demo postgres database target is deployed. Vault server is then configured using the database secrets engine and policies allowing Boundary to request credentials for two roles, a DBA and an "analyst". Boundary DBA and analyst targets are configured using a credential store that contains credential libraries for both targets. This enables credential brokering via Vault, which is demonstrated using the boundary connect postgres command.
Instead of running the commands imperatively use Ansible, Docker-Compose, and Terraform to do the Job for You.
Metadata
Metadata
Assignees
Labels
BoundaryBoundary-related issuesBoundary-related issuesVaultVault-related issuesVault-related issuesansibleansible-related issuesansible-related issuesenhancementNew feature or requestNew feature or requestterraformthis regards Terraform related stuffthis regards Terraform related stuff