vault: add OpenBao OIDC integration with Kanidm
Some checks failed
Run nix flake check / flake-check (push) Has been cancelled
Some checks failed
Run nix flake check / flake-check (push) Has been cancelled
This commit is contained in:
@@ -8,3 +8,50 @@ path "sys/metrics" {
|
||||
}
|
||||
EOT
|
||||
}
|
||||
|
||||
# OIDC admin policy - full read/write to all secrets
|
||||
resource "vault_policy" "oidc_admin" {
|
||||
name = "oidc-admin"
|
||||
|
||||
policy = <<EOT
|
||||
# Full access to KV secrets
|
||||
path "secret/*" {
|
||||
capabilities = ["create", "read", "update", "delete", "list"]
|
||||
}
|
||||
|
||||
# Read system health and metrics
|
||||
path "sys/health" {
|
||||
capabilities = ["read"]
|
||||
}
|
||||
|
||||
path "sys/metrics" {
|
||||
capabilities = ["read"]
|
||||
}
|
||||
|
||||
# List auth methods and mounts
|
||||
path "sys/auth" {
|
||||
capabilities = ["read"]
|
||||
}
|
||||
|
||||
path "sys/mounts" {
|
||||
capabilities = ["read"]
|
||||
}
|
||||
EOT
|
||||
}
|
||||
|
||||
# OIDC default policy - minimal access for authenticated users
|
||||
resource "vault_policy" "oidc_default" {
|
||||
name = "oidc-default"
|
||||
|
||||
policy = <<EOT
|
||||
# Read own token info
|
||||
path "auth/token/lookup-self" {
|
||||
capabilities = ["read"]
|
||||
}
|
||||
|
||||
# Read system health
|
||||
path "sys/health" {
|
||||
capabilities = ["read"]
|
||||
}
|
||||
EOT
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user