Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

bound_cidrs restriction on tokens obtained from aws auth method #5946

Closed
atheiman opened this issue Dec 12, 2018 · 3 comments
Closed

bound_cidrs restriction on tokens obtained from aws auth method #5946

atheiman opened this issue Dec 12, 2018 · 3 comments
Milestone

Comments

@atheiman
Copy link
Contributor

Need to be able to restrict tokens obtained from the aws auth method to only be used from a specified CIDR. It looks like there are plans to add this to multiple auth methods according to @tyrannosaurus-becks comment here #4662 (comment)

joelthompson added a commit to joelthompson/vault that referenced this issue Dec 13, 2018
This adds support for specifying a bound_cidr parameter on AWS auth role
entries. The singular name of "bound_cidr" is chosen instead of the
plural "bound_cidrs" as the other bindings in AWS auth roles are all
singularly named but many of them take multiple values as well, so this
maintains that consistency.

Fixes hashicorp#5946
@joelthompson
Copy link
Contributor

Hi @atheiman -- I just opened #5949 which should implement this! :)

@edwardbartholomew
Copy link

Thank you @joelthompson ! 🎆

@chrishoffman chrishoffman added this to the 1.0.3 milestone Jan 23, 2019
@jefferai jefferai modified the milestones: 1.0.3, 1.0.4 Feb 1, 2019
@briankassouf briankassouf modified the milestones: 1.0.4, 1.1.1 Mar 14, 2019
@jefferai jefferai modified the milestones: 1.1.1, 1.2 Apr 10, 2019
@jefferai
Copy link
Member

jefferai commented Jul 2, 2019

Coming in 1.2!

@jefferai jefferai closed this as completed Jul 2, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

6 participants