File tree Expand file tree Collapse file tree 4 files changed +546
-93
lines changed
docs/EN_US/ContainerizedHPCC/ContainerizedMods Expand file tree Collapse file tree 4 files changed +546
-93
lines changed Original file line number Diff line number Diff line change @@ -1467,6 +1467,30 @@ thor: []
14671467 credentials.</para >
14681468 </sect3 >
14691469
1470+ <sect3 id =" Deploying_AkeylessVault" >
1471+ <title >Deploy the Akeyless Vaultless Platform</title >
1472+
1473+ <para >To use Akeyless, set the vault type to <emphasis >akeyless</emphasis >
1474+ and the kind to <emphasis >akeyless</emphasis >. The URL should point to
1475+ the Akeyless API endpoint or your gateway. Provide an access ID and
1476+ access key, typically from environment variables or a secure secret.
1477+ A token can also be supplied via the client-secret if desired.</para >
1478+
1479+ <programlisting lang =" YAML" > vaults:
1480+ authn:
1481+ - name: my-authn-akeyless
1482+ type: akeyless
1483+ kind: akeyless
1484+ url: https://api.akeyless.io
1485+ accessId: ${env.AKEYLESS_ACCESS_ID}
1486+ accessKey: ${env.AKEYLESS_ACCESS_KEY}
1487+ </programlisting >
1488+
1489+ <para >The secret name referenced by HPCC (for example, in LDAP settings)
1490+ is passed to Akeyless as the secret name in the get-secret-value API.
1491+ If a version is provided, it will be used when retrieving the secret.</para >
1492+ </sect3 >
1493+
14701494 <sect3 id =" REF_HASHICORPVault_LDAP" >
14711495 <title >Referencing Vault Stored Authentication</title >
14721496
Original file line number Diff line number Diff line change @@ -718,6 +718,9 @@ vaults:
718718 {{- range $vault := . }}
719719 - name: {{ $vault .name }}
720720 kind: {{ $vault .kind }}
721+ {{- if $vault .type }}
722+ type: {{ $vault .type }}
723+ {{- end }}
721724 {{- if $vault .namespace }}
722725 namespace: {{ $vault .namespace }}
723726 {{- end }}
@@ -734,6 +737,15 @@ vaults:
734737 {{- if index $vault " appRoleSecret" }}
735738 appRoleSecret: {{ index $vault " appRoleSecret" }}
736739 {{- end -}}
740+ {{- if index $vault " accessId" }}
741+ accessId: {{ index $vault " accessId" }}
742+ {{- end -}}
743+ {{- if index $vault " accessKey" }}
744+ accessKey: {{ index $vault " accessKey" }}
745+ {{- end }}
746+ {{- if index $vault " accessType" }}
747+ accessType: {{ index $vault " accessType" }}
748+ {{- end -}}
737749 {{- if $vaultClientIssuerEnabled }}
738750 {{- if not (index $vault " client-secret" ) }}
739751 {{- if not (index $vault " appRoleId" ) }}
Original file line number Diff line number Diff line change 944944 "type" : " string" ,
945945 "enum" : [" kv-v2" , " kv-v1" ]
946946 },
947+ "type" : {
948+ "description" : " The vault provider type (e.g. 'akeyless' or kv backend)" ,
949+ "type" : " string" ,
950+ "enum" : [" kv-v2" , " kv-v1" , " akeyless" ]
951+ },
952+ "accessId" : {
953+ "description" : " Access ID used by Akeyless-style vaults" ,
954+ "type" : " string"
955+ },
956+ "accessKey" : {
957+ "description" : " Access Key used by Akeyless-style vaults" ,
958+ "type" : " string"
959+ },
947960 "client-secret" : {
948961 "description" : " optional name of kubernetes secret that will provide the vault client token" ,
949962 "type" : " string"
You can’t perform that action at this time.
0 commit comments