Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Vault PKI should support roles that constrain the CN domain but not the email domain #5991

Closed
chadparry opened this issue Dec 27, 2018 · 2 comments

Comments

@chadparry
Copy link

Is your feature request related to a problem? Please describe.
My use case is that I want to issue a certificate for a service that will be running on a certain host. I want the PKI role permissions to be as constrained as possible. Say the host will be "mexec99.example.net". To help with maintenance, I also include an email address "myteam@example.com" in the certificate's SAN. To support that, I have to create a role with the field "allowed_domains": ["example.com", "mexec99.example.net"]. The resulting role could potentially submit a CSR for the DNS "example.com" even though my intention is for it to only be able to get a certificate for "mexec99.example.net". But if I remove "example.com" from the allowed_domains, then the email address in the SAN causes the entire request to be rejected.

Describe the solution you'd like
I would like to have separate constraints for the email domain and the CN domain. They have drastically different security requirements. Either there could be a separate field for allowed email domains, or there could be a flag for allowing any email domain. The simplest solution would be to add an allow_any_email field or an enforce_email_hostnames field to the PKI role.

@aphorise
Copy link
Contributor

@chadparry I wonder if enforce_hostnames = "false" could achieve you're after. Have you tried?

@vishalnayak
Copy link
Member

Issues that are not reproducible and/or have not had any interaction for a long time are stale issues. Sometimes even the valid issues remain stale lacking traction either by the maintainers or the community. In order to provide faster responses and better engagement with the community, we strive to keep the issue tracker clean and the issue count low. In this regard, our current policy is to close stale issues after 30 days. If a feature request is being closed, it means that it is not on the product roadmap. Closed issues will still be indexed and available for future viewers. If users feel that the issue is still relevant but is wrongly closed, we encourage reopening them.

Please refer to our contributing guidelines for details on issue lifecycle.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

5 participants