File tree Expand file tree Collapse file tree 4 files changed +546
-93
lines changed
docs/EN_US/ContainerizedHPCC/ContainerizedMods Expand file tree Collapse file tree 4 files changed +546
-93
lines changed Original file line number Diff line number Diff line change @@ -1478,6 +1478,30 @@ thor: []
14781478 credentials.</para >
14791479 </sect3 >
14801480
1481+ <sect3 id =" Deploying_AkeylessVault" >
1482+ <title >Deploy the Akeyless Vaultless Platform</title >
1483+
1484+ <para >To use Akeyless, set the vault type to <emphasis >akeyless</emphasis >
1485+ and the kind to <emphasis >akeyless</emphasis >. The URL should point to
1486+ the Akeyless API endpoint or your gateway. Provide an access ID and
1487+ access key, typically from environment variables or a secure secret.
1488+ A token can also be supplied via the client-secret if desired.</para >
1489+
1490+ <programlisting lang =" YAML" > vaults:
1491+ authn:
1492+ - name: my-authn-akeyless
1493+ type: akeyless
1494+ kind: akeyless
1495+ url: https://api.akeyless.io
1496+ accessId: ${env.AKEYLESS_ACCESS_ID}
1497+ accessKey: ${env.AKEYLESS_ACCESS_KEY}
1498+ </programlisting >
1499+
1500+ <para >The secret name referenced by HPCC (for example, in LDAP settings)
1501+ is passed to Akeyless as the secret name in the get-secret-value API.
1502+ If a version is provided, it will be used when retrieving the secret.</para >
1503+ </sect3 >
1504+
14811505 <sect3 id =" REF_HASHICORPVault_LDAP" >
14821506 <title >Referencing Vault Stored Authentication</title >
14831507
Original file line number Diff line number Diff line change @@ -781,6 +781,9 @@ vaults:
781781 {{- range $vault := . }}
782782 - name: {{ $vault .name }}
783783 kind: {{ $vault .kind }}
784+ {{- if $vault .type }}
785+ type: {{ $vault .type }}
786+ {{- end }}
784787 {{- if $vault .namespace }}
785788 namespace: {{ $vault .namespace }}
786789 {{- end }}
@@ -797,6 +800,15 @@ vaults:
797800 {{- if index $vault " appRoleSecret" }}
798801 appRoleSecret: {{ index $vault " appRoleSecret" }}
799802 {{- end -}}
803+ {{- if index $vault " accessId" }}
804+ accessId: {{ index $vault " accessId" }}
805+ {{- end -}}
806+ {{- if index $vault " accessKey" }}
807+ accessKey: {{ index $vault " accessKey" }}
808+ {{- end }}
809+ {{- if index $vault " accessType" }}
810+ accessType: {{ index $vault " accessType" }}
811+ {{- end -}}
800812 {{- if $vaultClientIssuerEnabled }}
801813 {{- if not (index $vault " client-secret" ) }}
802814 {{- if not (index $vault " appRoleId" ) }}
Original file line number Diff line number Diff line change 10411041 "type" : " string" ,
10421042 "enum" : [" kv-v2" , " kv-v1" ]
10431043 },
1044+ "type" : {
1045+ "description" : " The vault provider type (e.g. 'akeyless' or kv backend)" ,
1046+ "type" : " string" ,
1047+ "enum" : [" kv-v2" , " kv-v1" , " akeyless" ]
1048+ },
1049+ "accessId" : {
1050+ "description" : " Access ID used by Akeyless-style vaults" ,
1051+ "type" : " string"
1052+ },
1053+ "accessKey" : {
1054+ "description" : " Access Key used by Akeyless-style vaults" ,
1055+ "type" : " string"
1056+ },
10441057 "client-secret" : {
10451058 "description" : " optional name of kubernetes secret that will provide the vault client token" ,
10461059 "type" : " string"
You can’t perform that action at this time.
0 commit comments