How do I protect the Azure Client ID and Client Secret in HashiCorp Vaults with AKV Auto-Unseal?

Say I set up a HashiCorp Vault, on dedicated hardware, with an AKV seal stanza like the following:

seal “azurekeyvault” {
tenant_id = “46646709-b63e-4747-be42-516edeaf1e14”
client_id = “03dc33fc-16d9-4b77-8152-… Continue reading How do I protect the Azure Client ID and Client Secret in HashiCorp Vaults with AKV Auto-Unseal?

If one HashiCorp Vault Policy allows a capability, and another denies it, how does it decide which Policy to honor?

HashiCorp Vault is an open source tool for secrets management.

I’m using it for this purpose, and have come across a minor issue. I seemingly cannot deny access to a specific API path.

I’ve tested this on 2 different Vault clusters. An… Continue reading If one HashiCorp Vault Policy allows a capability, and another denies it, how does it decide which Policy to honor?

Does allowing a user to know their own authorized capabilities decrease security?

In a system with a complex set of computed authorizations, does conveniently allowing a given user access to view all of their own authorizations decrease security?

In a “Policy as Code” system which relies on consumers of … Continue reading Does allowing a user to know their own authorized capabilities decrease security?

Can I use HashiCorp Vault to restrict access to credentials based on CIDR ranges?

This seems like a pretty simple use case, but it would depend on some pretty recently added functionality which I might not understand yet:

A python script gets populated by configuration management on a few monitoring serve… Continue reading Can I use HashiCorp Vault to restrict access to credentials based on CIDR ranges?