8000 Add example policy to AWS secrets engine for AssumeRole that will still be able to rotate itself by nphilbrook · Pull Request #30747 · hashicorp/vault · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

Add example policy to AWS secrets engine for AssumeRole that will still be able to rotate itself #30747

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your ac 8000 count

Open
wants to merge 7 commits into
base: main
Choose a base branch
from

Conversation

nphilbrook
Copy link
Contributor
@nphilbrook nphilbrook commented May 23, 2025

Description

Adds documentation and an example policy for STS credential types to be able to rotate themselves.

Note I have tested this exact policy in my lab and also in this example repo for dynamic auth 8000 hashicorp/terraform-dynamic-credentials-setup-examples#31

Preview: https://vault-i4qzmdcu7-hashicorp.vercel.app/vault/docs/secrets/aws#policies-for-sts-credentials

@nphilbrook nphilbrook requested review from a team as code owners May 23, 2025 19:50
@nphilbrook nphilbrook requested review from brewgator and anwittin May 23, 2025 19:50
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant
0