File tree Expand file tree Collapse file tree 4 files changed +546
-93
lines changed
docs/EN_US/ContainerizedHPCC/ContainerizedMods Expand file tree Collapse file tree 4 files changed +546
-93
lines changed Original file line number Diff line number Diff line change @@ -1478,6 +1478,30 @@ thor: []
14781478 credentials.</para >
14791479 </sect3 >
14801480
1481+ <sect3 id =" Deploying_AkeylessVault" >
1482+ <title >Deploy the Akeyless Vaultless Platform</title >
1483+
1484+ <para >To use Akeyless, set the vault type to <emphasis >akeyless</emphasis >
1485+ and the kind to <emphasis >akeyless</emphasis >. The URL should point to
1486+ the Akeyless API endpoint or your gateway. Provide an access ID and
1487+ access key, typically from environment variables or a secure secret.
1488+ A token can also be supplied via the client-secret if desired.</para >
1489+
1490+ <programlisting lang =" YAML" > vaults:
1491+ authn:
1492+ - name: my-authn-akeyless
1493+ type: akeyless
1494+ kind: akeyless
1495+ url: https://api.akeyless.io
1496+ accessId: ${env.AKEYLESS_ACCESS_ID}
1497+ accessKey: ${env.AKEYLESS_ACCESS_KEY}
1498+ </programlisting >
1499+
1500+ <para >The secret name referenced by HPCC (for example, in LDAP settings)
1501+ is passed to Akeyless as the secret name in the get-secret-value API.
1502+ If a version is provided, it will be used when retrieving the secret.</para >
1503+ </sect3 >
1504+
14811505 <sect3 id =" REF_HASHICORPVault_LDAP" >
14821506 <title >Referencing Vault Stored Authentication</title >
14831507
Original file line number Diff line number Diff line change @@ -718,6 +718,9 @@ vaults:
718718 {{- range $vault := . }}
719719 - name: {{ $vault .name }}
720720 kind: {{ $vault .kind }}
721+ {{- if $vault .type }}
722+ type: {{ $vault .type }}
723+ {{- end }}
721724 {{- if $vault .namespace }}
722725 namespace: {{ $vault .namespace }}
723726 {{- end }}
@@ -734,6 +737,15 @@ vaults:
734737 {{- if index $vault " appRoleSecret" }}
735738 appRoleSecret: {{ index $vault " appRoleSecret" }}
736739 {{- end -}}
740+ {{- if index $vault " accessId" }}
741+ accessId: {{ index $vault " accessId" }}
742+ {{- end -}}
743+ {{- if index $vault " accessKey" }}
744+ accessKey: {{ index $vault " accessKey" }}
745+ {{- end }}
746+ {{- if index $vault " accessType" }}
747+ accessType: {{ index $vault " accessType" }}
748+ {{- end -}}
737749 {{- if $vaultClientIssuerEnabled }}
738750 {{- if not (index $vault " client-secret" ) }}
739751 {{- if not (index $vault " appRoleId" ) }}
Original file line number Diff line number Diff line change 10221022 "type" : " string" ,
10231023 "enum" : [" kv-v2" , " kv-v1" ]
10241024 },
1025+ "type" : {
1026+ "description" : " The vault provider type (e.g. 'akeyless' or kv backend)" ,
1027+ "type" : " string" ,
1028+ "enum" : [" kv-v2" , " kv-v1" , " akeyless" ]
1029+ },
1030+ "accessId" : {
1031+ "description" : " Access ID used by Akeyless-style vaults" ,
1032+ "type" : " string"
1033+ },
1034+ "accessKey" : {
1035+ "description" : " Access Key used by Akeyless-style vaults" ,
1036+ "type" : " string"
1037+ },
10251038 "client-secret" : {
10261039 "description" : " optional name of kubernetes secret that will provide the vault client token" ,
10271040 "type" : " string"
You can’t perform that action at this time.
0 commit comments