Configuring cloud credentials using HashiCorp Vault
Configure Knox IDBroker with HashiCorp Vault to securely manage AWS credentials. This
process requires retrieving short-lived tokens, enhancing security, and eliminating
long-term credential storage.
Knox IDBroker can be configured with HashiCorp Vault to enhance AWS credentials
management. HashiCorp Vault enables Knox to retrieve short-lived AWS credentials
from HashiCorp Vault, improving security and eliminating the need for long-term
credential storage.
HashiCorp Vault must be installed and properly configured.
An AWS account must be available with the required IAM roles.
Network connectivity must be established between Knox and the HashiCorp
Vault server.
Go to Cloudera Manager > Knox > Configuration.
Search for the Save Alias Command Input - IDBroker
property.
The
value string includes the following parameters:
hashicorp.vault.enabled=true – Enables the
vault integration for that specific topology.
hashicorp.vault.address=[***VAULT
ADDRESS***] – Replace [***VAULT
ADDRESS***] with the actual address of the
vault.
hashicorp.vault.path=aws/sts –Specifies the
path for the STS credentials.
(Optional)
hashicorp.vault.server.cert.path=[***VAULT CERTIFICATE
PATH***] – Adds the path for the vault
certificate. Required in case of self-signed certificates.
Replace [***VAULT CERTIFICATE PATH***] with
the path to the certificate.
Click Save Changes(CTRL+S).
Search for the Knox IDBroker AWS User Mapping
property.
Enter the following parameter:
rangerraz=arn:aws:iam::<ARN>:role/S3RazRole
Refresh the Knox instance configuration by clicking the Stale
Configuration: Refresh needed indicator and wait until the
refresh process completes.
Verify that the vault integration was successful by running the following
command in the Command Line Interface (CLI):