SlideShare a Scribd company logo
1 of 16
Download to read offline
OVERVIEW
Overview of concepts that are important to understand for day
to day vault usage and operations.
These notes follow HashiCorp specific structure found here:
http://www.vaultproject.io/docs/concepts
I have created these notes as part of my personal learning and
hope to be able to help and inspire others.
I would recommend viewing the official vault docs to gain full
and detailed explanations.
I will be releasing interactive notebooks for all configuration
detailed in these guides .
Follow my instagram @adnans_techie_studies for updates
DEV SERVER MODE
COMMAND
INSECURE AND DEV VAULT SERVER DEV
LOSE DATA ON a
MODE
RESTART
v
NO FURTHER SETUP
ALLFEATURESAVAILABLE
EXPERIMENT WITHVAULT
NO NEED TO UNSEAL
ALL DATA STORED IN MEMORY
BOUND TO LOCAL ADDRESS WITHOUT TLS
AUTO AUTHENTICATE
SINGLE UNSEAL KEY
V2 KU SECRET ENGINE
SEAL UNSEAL
VAULTCANSEEa
VAULT starts.ws SEALED canSEE
BUT
STARTED STATE STORAGE
UNABLETODECRYPT
How
UNSEAL
t
OBTAINMASTER
KEYTO READ
DECRYPTIONKEY DECRYPT DATA
To
WHY s DATASTOREDBYVAULTIS ENCRYPTED
SHARED
NEED SHAMIR
v KEYS
ENCRYPTIONKEY To DECRYPT
Is COMBINED
50 STOREDWITH KEY
INDATA
i KEYRING
ENCRYPTEDWITH ENCRYPTED ENCRYPTED
MASTERKEY ENCRYPTEDAGAIN MASTER KEYRING
But
www
VAULTSTORAGE
UNSEALKEY
UNSEALING s VAULTOPERATORUNSEAL 012 API
SEALINGwine THROWAWAY UNSEAL
ONCEUNSEALED MASTERKEY THEN process
REMAINSUNSEALED UNLESS
THESE
CANBEDONE
BYROOT
x x x
RESEALVIAAPI SERVERRESTART VAULTSTORAGE
UNRECOVERABLE
ERROR
SEALMIGRATION
from
DELEGATETO use AUTO To
REDUCEOPERATIONAL KMSSEAL SHAMIRSEAL
SERVICE UNSEAL COMPLEXITY OF
SHAMIRSEAL s KMSSEAL
UNSEALKEYS
KMSSEAL KMSSEAL
KMS initialisation
v AND
SHAMIRKEYS CALLED
RECOVERY KEYSGENERATED REQUIRES DOWNTIME
LEASE RENEW AND REVOKE
DYNAMIC SECRET
AND LEASE s REVOKED NOFURTHERHas IE THEN
SERVICETYPE RENEWALHas
AVTHTOKEN r
TTL
AND
v
CHECKS WITH
VAULT REGULARLY to AUDIT LOCTS
LEASEID is
USEDTOMANAGE LEASE DURATION
LEASEOFSECRET fakes
INCREMENT
is
FROMTHETIME OF REQUEST
AND BACKEND CAN IGNOREIT
PREFIXBASED HAS
ABILITY TO REVOKE can REVOKE
REVOCATION
MULTIPLESECRETS TREE
SECRETS
IF
GITHUB INTRUSION WITHIN
0 AUTH
SPECIFICSYSTEMMETHODS s LDAP
CLIENT AppROLE
v
ENABLE
BEFORE AUTHENTICATION
USE
TOKENS first VERIFY GENERATE ASSOCIATE TOKEN
IDENTITY
THEN
USEDFor
VAULT REVOCATION AND RENEWAL
LOGIN
LEASEASSOCIATED REAUTH AFTERAGIVENPERIOD
TOKENS
TOKEN TOKENAUTH
STORE BACKEND
is
ROOT can Do 1
TOKENS
R FlAt L ANYTHING
RESPONSIBLE FOR
CREATINGANDSTORING
TOKENS
SETTONEVER AND
EXPIRE CANNOT BEDISABLED
EEE'm
ftp.rnLEEazfEoYofEEformT ME
GENERATE WITHPERMISSION of Quorum UNSEALKEY
SHOULDONLY BEUSED
HOLDERS
FORINITIALSETUP
OR
EMERGENCY
TOKEN SERVICETOKEN HOLDER
CREATETOKEN TYPES f
CHILDTOKEN NORMAL TOKENS
PARENT
CHILDTOKEN
REVOKES
ALL
BATCH
OR
ORPHAN TOKEN ENCRYPTED
BLOBS VAULT
ACTIONS
NOPFRENT REQUIRE
NOSTORAGE
REVOKETHETOKEN
9
TOKEN TOKEN ACCESSOR
RENEWTHETOKENh
Accessors CREATED CREATEDAND
RETURNED
N
LOOKUPTOKEN TOKENCAPABILITIES
PROPERTIES
EXAMPLE
USE ANOTHER
SERVICE service JOB ID JOBCOMPLETE
CREATES
TOKEN
STORES ACCESSOR REVOKEWHEN
AND FINISHED
TOKENS CONTINUED
GENERAL IF NO IT IS COMPARED TO MAX TTL
EXPLICIT TTL
TOKENS
L
MAX TTL SYSTEMMAYTTL
EXPLICIT HARD IGNORES VALUESET a
COMBINATION
32DAYS
TTL LIMIT 134AUTH v
METHOD BASEDON
MOUNT CANOVERRIDE
THESYSTEMMAX
SYSTEMS PERIODICALLY PERFORMTASK
PERIODIC LONG RUNNING 502 CONNECTION
TOKENS SERVICES POOL
OUTSIDE OFROOT ONLY OTHER WAY TO HAVE UNLIMITED LIFETIME
U
MUSTRENEW WITHIN CONFIGURED PERIOD
BOUND TO GDR
CIDR BOUND
TOKENS
RESTRICT CLIENTS WHO CAN USE
RESPONSE WRAPPING
REQUESTS
SERVER 7
1
NEEDS TLS
PRIVATEKEY RETURNSSINGLEUSETOKEN
CUBBYHOLE
RESPONSE
WRAPPING
L LIMIT LIFETIME
PROVIDECOVER OF
FORSECRET DETECT SECRETEXPOSURE
INFORMATION MALFEASANCE
NOT SECRET SINGLEPARTYCAN WRAPPING IS
BUTREFERENCE UNWRAPAND SEE SEPERATEFROM
SECRET
RESPONSE DOES NOT CONTAIN
WRAPPING THE SECRET
WRAPPED ACCESSOR
TOKENS u
INSTEAD 5
CREATION PATH
L v J
TTL OF
WRAPPING TOKEN CREATION
TOKEN
TIME
POLICIES
EVERYTHING IN VAULT IS PATHBASED AND POLICES IS NO EXCEPTION
GRANT FORBID ACCESS To CERTAIN PATHS OPERATIONS
DENY BY DEFAULT DOESNOTSTORE
DELEGATESAUTHMETHOD
I CONNECTAUTHBACKEND
LDAP
SECURITY
ADMIN TEAM
2 AUTHORVAULT
TEAM Policy
g
ya µq a
POLICY
ADOUGROUPDEV TO
READONLYDEVINVAULT
3ATTACHVAULT F
TOKEN x
O T4
1 CONNECTAUTHBACKEND POLICY
CLIENTSrUSERS
4 RETURNTOKEN 2verifycresswithAUTH
v
LDAP
SYNTAX
PATH Secret EXAMPLE
capabilities create read update delete list GRANTS ALLACCESSONSECRET
T
D
PARAMETER
PROVIDE FINE GRAINED CONTROL FINE TRAINE CONSTRAINTS
OVER PERMITTED DENIEDOPERATIONS CONTROL
REQUIRE
Set Min maxRESPONSEWRAPPING
TTLS
POLICIES CONTINUED
CANNOT BE REMOVED
DEFAULT
BUILT IN
POLICY
POLICIES ATTACHED TO ALL TOKENS
ROOT CANNOT BEMODIFIED ORREMOVED
POLICY
USERCANDOANYTHING
DELETINGPOLICIES a MANACTING LISTING POLICIES
Hautdelete
syspolicyltestpolicy vault read systpolicy
POLICIES
u v
UPDATING POLICIES CREATING POLICIES
vaultwritesystpolicyltestpolicy Vaultpolicywrite testpolicy testpolicyhcl
policy updated policyJson
HIGH AVAILABILITY MODE
HA AUTOMATICALLY ENABLED IF DATA STORE SUPPORTS 1
I
T
CHECK IF
HAAVAILABLE
NEXTTODS
0N SERVER
BOTH TRY GRAB LOCK
I
9 SUCCESSFUL ACTIVE NODE
DATA ELSE STANDBY NODE
STORE
IF STANDBYNODEGETSREQUEST FORWARD REDIRECTDEPENDINGONSTATE
REDIRECTION MODE MUST BE MET FORHA CLUSTER TO WORK
UNSEALED
SERVER TO writesInformation 1 STANDBY
SERVERCOMMUNICATION ABOUTSELF READ NODES
ACTIVE VAULT
STORAGE
NOTCOMMUNICATED OVERNETWORK
CLIENT X VAULT NO REQUEST FORWARDING
REDIRECTION
IF NONEMPTYVALVE
REDIRECTCLIENTWITH307CODETOACTIVENODE
I REDIRECTADDRESS
DIRECT
apiaddr SHOULD BETHATNODES ADDRESS
ACCESS
THISSHOULDBEAVOIDED
LOAD THELB MUSTBEAWAREOFTHEBALANCERS
ACTWELEADERORREDIRECTS WILLLOOP
INTEGRATED STORAGE
VAULT 1.4 INTEGRATED STORAGE
HA SEMANTICS ENTERPRISE REPLICATION BACKUPANDRESTORE
CONSENSUS PROTOCOL TO REPLICATE DATTA TO EACH SERVER IN CLUSTER
JOIN NODE USE SAME SEAL MECHANISM JOIN REPLICATE
PGP GPG AND KEYBASE
OPENPGP COMPATIBLE PROGRAMS
VAULT GPG a
INTEGRATION
KEYBASE IO
PREVAULT 0.3 SECUREMESSAGING
ANDUNSEALKEYSIN
FILE SHARING
PLAINTEXT
GIVENTOINITIAL
USER BAD
VAULT UNSEAL KEY DISTRIBUTION
GENERATE UNSEAL
KEYANDIMMEDIATELY e
INITIALISING WITH
PGP
ENCRYPT USING
GIVENUSERS PUBLIC
PGPKEYS IMPORT APPROPRIATE
KEYS
KEYBASE GPG
1
SIMPLE AND
KEY MANAGEMENT
RECOVERY MODE
AUTOMATICALLY UNSEALED ONCE RECOVERY TOKEN ISSUED
RECOVERY TOKEN OPERATIONS AND 5451RAW ENDPOINT
WON'T FORM CLUSTERS OR HANDLE REQUEST FROMSTANDBY
RAFT INTEGRATE STORAGE IS MAIN REASON
r
AUTO RESIZE CLUSTER TO 1
THEN REJOIN RAFT CLUSTER

More Related Content

What's hot

Hands-On Introduction to Kubernetes at LISA17
Hands-On Introduction to Kubernetes at LISA17Hands-On Introduction to Kubernetes at LISA17
Hands-On Introduction to Kubernetes at LISA17Ryan Jarvinen
 
Top 5 Mistakes to Avoid When Writing Apache Spark Applications
Top 5 Mistakes to Avoid When Writing Apache Spark ApplicationsTop 5 Mistakes to Avoid When Writing Apache Spark Applications
Top 5 Mistakes to Avoid When Writing Apache Spark ApplicationsCloudera, Inc.
 
ACID ORC, Iceberg, and Delta Lake—An Overview of Table Formats for Large Scal...
ACID ORC, Iceberg, and Delta Lake—An Overview of Table Formats for Large Scal...ACID ORC, Iceberg, and Delta Lake—An Overview of Table Formats for Large Scal...
ACID ORC, Iceberg, and Delta Lake—An Overview of Table Formats for Large Scal...Databricks
 
Prometheus in Practice: High Availability with Thanos (DevOpsDays Edinburgh 2...
Prometheus in Practice: High Availability with Thanos (DevOpsDays Edinburgh 2...Prometheus in Practice: High Availability with Thanos (DevOpsDays Edinburgh 2...
Prometheus in Practice: High Availability with Thanos (DevOpsDays Edinburgh 2...Thomas Riley
 
Apache Spark Fundamentals
Apache Spark FundamentalsApache Spark Fundamentals
Apache Spark FundamentalsZahra Eskandari
 
A Thorough Comparison of Delta Lake, Iceberg and Hudi
A Thorough Comparison of Delta Lake, Iceberg and HudiA Thorough Comparison of Delta Lake, Iceberg and Hudi
A Thorough Comparison of Delta Lake, Iceberg and HudiDatabricks
 
Comprehensive Terraform Training
Comprehensive Terraform TrainingComprehensive Terraform Training
Comprehensive Terraform TrainingYevgeniy Brikman
 
Apache Spark overview
Apache Spark overviewApache Spark overview
Apache Spark overviewDataArt
 
Getting Started with Kubernetes
Getting Started with Kubernetes Getting Started with Kubernetes
Getting Started with Kubernetes VMware Tanzu
 
Databricks Platform.pptx
Databricks Platform.pptxDatabricks Platform.pptx
Databricks Platform.pptxAlex Ivy
 
RedHat OpenStack Platform Overview
RedHat OpenStack Platform OverviewRedHat OpenStack Platform Overview
RedHat OpenStack Platform Overviewindevlab
 
Kubernetes 101 for Beginners
Kubernetes 101 for BeginnersKubernetes 101 for Beginners
Kubernetes 101 for BeginnersOktay Esgul
 
Hyperspace for Delta Lake
Hyperspace for Delta LakeHyperspace for Delta Lake
Hyperspace for Delta LakeDatabricks
 
Oracle Database Migration to Oracle Cloud Infrastructure
Oracle Database Migration to Oracle Cloud InfrastructureOracle Database Migration to Oracle Cloud Infrastructure
Oracle Database Migration to Oracle Cloud InfrastructureSinanPetrusToma
 
Terraform 0.9 + good practices
Terraform 0.9 + good practicesTerraform 0.9 + good practices
Terraform 0.9 + good practicesRadek Simko
 
Monitoring, Logging and Tracing on Kubernetes
Monitoring, Logging and Tracing on KubernetesMonitoring, Logging and Tracing on Kubernetes
Monitoring, Logging and Tracing on KubernetesMartin Etmajer
 
Azure data bricks by Eugene Polonichko
Azure data bricks by Eugene PolonichkoAzure data bricks by Eugene Polonichko
Azure data bricks by Eugene PolonichkoAlex Tumanoff
 

What's hot (20)

Hands-On Introduction to Kubernetes at LISA17
Hands-On Introduction to Kubernetes at LISA17Hands-On Introduction to Kubernetes at LISA17
Hands-On Introduction to Kubernetes at LISA17
 
Top 5 Mistakes to Avoid When Writing Apache Spark Applications
Top 5 Mistakes to Avoid When Writing Apache Spark ApplicationsTop 5 Mistakes to Avoid When Writing Apache Spark Applications
Top 5 Mistakes to Avoid When Writing Apache Spark Applications
 
File Format Benchmark - Avro, JSON, ORC and Parquet
File Format Benchmark - Avro, JSON, ORC and ParquetFile Format Benchmark - Avro, JSON, ORC and Parquet
File Format Benchmark - Avro, JSON, ORC and Parquet
 
ACID ORC, Iceberg, and Delta Lake—An Overview of Table Formats for Large Scal...
ACID ORC, Iceberg, and Delta Lake—An Overview of Table Formats for Large Scal...ACID ORC, Iceberg, and Delta Lake—An Overview of Table Formats for Large Scal...
ACID ORC, Iceberg, and Delta Lake—An Overview of Table Formats for Large Scal...
 
Prometheus in Practice: High Availability with Thanos (DevOpsDays Edinburgh 2...
Prometheus in Practice: High Availability with Thanos (DevOpsDays Edinburgh 2...Prometheus in Practice: High Availability with Thanos (DevOpsDays Edinburgh 2...
Prometheus in Practice: High Availability with Thanos (DevOpsDays Edinburgh 2...
 
Apache Spark Fundamentals
Apache Spark FundamentalsApache Spark Fundamentals
Apache Spark Fundamentals
 
A Thorough Comparison of Delta Lake, Iceberg and Hudi
A Thorough Comparison of Delta Lake, Iceberg and HudiA Thorough Comparison of Delta Lake, Iceberg and Hudi
A Thorough Comparison of Delta Lake, Iceberg and Hudi
 
Comprehensive Terraform Training
Comprehensive Terraform TrainingComprehensive Terraform Training
Comprehensive Terraform Training
 
Apache Spark overview
Apache Spark overviewApache Spark overview
Apache Spark overview
 
Getting Started with Kubernetes
Getting Started with Kubernetes Getting Started with Kubernetes
Getting Started with Kubernetes
 
Databricks Platform.pptx
Databricks Platform.pptxDatabricks Platform.pptx
Databricks Platform.pptx
 
RedHat OpenStack Platform Overview
RedHat OpenStack Platform OverviewRedHat OpenStack Platform Overview
RedHat OpenStack Platform Overview
 
Kubernetes 101 for Beginners
Kubernetes 101 for BeginnersKubernetes 101 for Beginners
Kubernetes 101 for Beginners
 
Introduce to Terraform
Introduce to TerraformIntroduce to Terraform
Introduce to Terraform
 
Hyperspace for Delta Lake
Hyperspace for Delta LakeHyperspace for Delta Lake
Hyperspace for Delta Lake
 
Oracle Database Migration to Oracle Cloud Infrastructure
Oracle Database Migration to Oracle Cloud InfrastructureOracle Database Migration to Oracle Cloud Infrastructure
Oracle Database Migration to Oracle Cloud Infrastructure
 
Docker Kubernetes Istio
Docker Kubernetes IstioDocker Kubernetes Istio
Docker Kubernetes Istio
 
Terraform 0.9 + good practices
Terraform 0.9 + good practicesTerraform 0.9 + good practices
Terraform 0.9 + good practices
 
Monitoring, Logging and Tracing on Kubernetes
Monitoring, Logging and Tracing on KubernetesMonitoring, Logging and Tracing on Kubernetes
Monitoring, Logging and Tracing on Kubernetes
 
Azure data bricks by Eugene Polonichko
Azure data bricks by Eugene PolonichkoAzure data bricks by Eugene Polonichko
Azure data bricks by Eugene Polonichko
 

Similar to Hashicorp Vault Associate Certification Concepts Part 2

Hashicorp Vault Associate Certification Configuration Part 3
Hashicorp Vault Associate Certification Configuration Part 3Hashicorp Vault Associate Certification Configuration Part 3
Hashicorp Vault Associate Certification Configuration Part 3Adnan Rashid
 
Hardening Your Config Management - Security and Attack Vectors in Config Mana...
Hardening Your Config Management - Security and Attack Vectors in Config Mana...Hardening Your Config Management - Security and Attack Vectors in Config Mana...
Hardening Your Config Management - Security and Attack Vectors in Config Mana...Peter Souter
 
API Security: Assume Possible Interference
API Security: Assume Possible InterferenceAPI Security: Assume Possible Interference
API Security: Assume Possible InterferenceJulie Tsai
 
Null bhopal Sep 2016: What it Takes to Secure a Web Application
Null bhopal Sep 2016: What it Takes to Secure a Web ApplicationNull bhopal Sep 2016: What it Takes to Secure a Web Application
Null bhopal Sep 2016: What it Takes to Secure a Web ApplicationAnant Shrivastava
 
Designing Secure APIs
Designing Secure APIsDesigning Secure APIs
Designing Secure APIsSteven Chen
 
Vault Associate Certification Internals
Vault Associate Certification Internals Vault Associate Certification Internals
Vault Associate Certification Internals Adnan Rashid
 
Enhance system transparency and truthfulness with request tracing
Enhance system transparency and truthfulness with request tracingEnhance system transparency and truthfulness with request tracing
Enhance system transparency and truthfulness with request tracingSam Keen
 
Getting started with salt stack
Getting started with salt stackGetting started with salt stack
Getting started with salt stackSuresh Paulraj
 
Getting started with salt stack
Getting started with salt stackGetting started with salt stack
Getting started with salt stackSuresh Paulraj
 
Website Security
Website SecurityWebsite Security
Website SecurityCarlos Z
 
Website Security
Website SecurityWebsite Security
Website SecurityMODxpo
 
Rugged Software Using Rugged Driven Development
Rugged Software Using Rugged Driven DevelopmentRugged Software Using Rugged Driven Development
Rugged Software Using Rugged Driven DevelopmentJames Wickett
 
XP Days 2019: First secret delivery for modern cloud-native applications
XP Days 2019: First secret delivery for modern cloud-native applicationsXP Days 2019: First secret delivery for modern cloud-native applications
XP Days 2019: First secret delivery for modern cloud-native applicationsVlad Fedosov
 
REST in ( a mobile ) peace @ WHYMCA 05-21-2011
REST in ( a mobile ) peace @ WHYMCA 05-21-2011REST in ( a mobile ) peace @ WHYMCA 05-21-2011
REST in ( a mobile ) peace @ WHYMCA 05-21-2011Alessandro Nadalin
 
s2gx2015 who needs batch
s2gx2015 who needs batchs2gx2015 who needs batch
s2gx2015 who needs batchGunnar Hillert
 
BUILDING MODERN PYTHON WEB FRAMEWORKS USING FLASK WITH NEIL GREY
BUILDING MODERN PYTHON WEB FRAMEWORKS USING FLASK WITH NEIL GREYBUILDING MODERN PYTHON WEB FRAMEWORKS USING FLASK WITH NEIL GREY
BUILDING MODERN PYTHON WEB FRAMEWORKS USING FLASK WITH NEIL GREYCodeCore
 
Locking down your Kubernetes cluster with Linkerd
Locking down your Kubernetes cluster with LinkerdLocking down your Kubernetes cluster with Linkerd
Locking down your Kubernetes cluster with LinkerdBuoyant
 
Hive: Public vs Private blockchains
Hive: Public vs Private blockchainsHive: Public vs Private blockchains
Hive: Public vs Private blockchainsRoderik van der Veer
 
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...Jisc
 

Similar to Hashicorp Vault Associate Certification Concepts Part 2 (20)

Hashicorp Vault Associate Certification Configuration Part 3
Hashicorp Vault Associate Certification Configuration Part 3Hashicorp Vault Associate Certification Configuration Part 3
Hashicorp Vault Associate Certification Configuration Part 3
 
Hardening Your Config Management - Security and Attack Vectors in Config Mana...
Hardening Your Config Management - Security and Attack Vectors in Config Mana...Hardening Your Config Management - Security and Attack Vectors in Config Mana...
Hardening Your Config Management - Security and Attack Vectors in Config Mana...
 
Lock it down
Lock it downLock it down
Lock it down
 
API Security: Assume Possible Interference
API Security: Assume Possible InterferenceAPI Security: Assume Possible Interference
API Security: Assume Possible Interference
 
Null bhopal Sep 2016: What it Takes to Secure a Web Application
Null bhopal Sep 2016: What it Takes to Secure a Web ApplicationNull bhopal Sep 2016: What it Takes to Secure a Web Application
Null bhopal Sep 2016: What it Takes to Secure a Web Application
 
Designing Secure APIs
Designing Secure APIsDesigning Secure APIs
Designing Secure APIs
 
Vault Associate Certification Internals
Vault Associate Certification Internals Vault Associate Certification Internals
Vault Associate Certification Internals
 
Enhance system transparency and truthfulness with request tracing
Enhance system transparency and truthfulness with request tracingEnhance system transparency and truthfulness with request tracing
Enhance system transparency and truthfulness with request tracing
 
Getting started with salt stack
Getting started with salt stackGetting started with salt stack
Getting started with salt stack
 
Getting started with salt stack
Getting started with salt stackGetting started with salt stack
Getting started with salt stack
 
Website Security
Website SecurityWebsite Security
Website Security
 
Website Security
Website SecurityWebsite Security
Website Security
 
Rugged Software Using Rugged Driven Development
Rugged Software Using Rugged Driven DevelopmentRugged Software Using Rugged Driven Development
Rugged Software Using Rugged Driven Development
 
XP Days 2019: First secret delivery for modern cloud-native applications
XP Days 2019: First secret delivery for modern cloud-native applicationsXP Days 2019: First secret delivery for modern cloud-native applications
XP Days 2019: First secret delivery for modern cloud-native applications
 
REST in ( a mobile ) peace @ WHYMCA 05-21-2011
REST in ( a mobile ) peace @ WHYMCA 05-21-2011REST in ( a mobile ) peace @ WHYMCA 05-21-2011
REST in ( a mobile ) peace @ WHYMCA 05-21-2011
 
s2gx2015 who needs batch
s2gx2015 who needs batchs2gx2015 who needs batch
s2gx2015 who needs batch
 
BUILDING MODERN PYTHON WEB FRAMEWORKS USING FLASK WITH NEIL GREY
BUILDING MODERN PYTHON WEB FRAMEWORKS USING FLASK WITH NEIL GREYBUILDING MODERN PYTHON WEB FRAMEWORKS USING FLASK WITH NEIL GREY
BUILDING MODERN PYTHON WEB FRAMEWORKS USING FLASK WITH NEIL GREY
 
Locking down your Kubernetes cluster with Linkerd
Locking down your Kubernetes cluster with LinkerdLocking down your Kubernetes cluster with Linkerd
Locking down your Kubernetes cluster with Linkerd
 
Hive: Public vs Private blockchains
Hive: Public vs Private blockchainsHive: Public vs Private blockchains
Hive: Public vs Private blockchains
 
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...
EAP TLS, the Rolls-Royce of extensible authentication protocol (EAP) methods ...
 

Recently uploaded

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Hashicorp Vault Associate Certification Concepts Part 2

  • 1.
  • 2.
  • 3.
  • 4. OVERVIEW Overview of concepts that are important to understand for day to day vault usage and operations. These notes follow HashiCorp specific structure found here: http://www.vaultproject.io/docs/concepts I have created these notes as part of my personal learning and hope to be able to help and inspire others. I would recommend viewing the official vault docs to gain full and detailed explanations. I will be releasing interactive notebooks for all configuration detailed in these guides . Follow my instagram @adnans_techie_studies for updates
  • 5. DEV SERVER MODE COMMAND INSECURE AND DEV VAULT SERVER DEV LOSE DATA ON a MODE RESTART v NO FURTHER SETUP ALLFEATURESAVAILABLE EXPERIMENT WITHVAULT NO NEED TO UNSEAL ALL DATA STORED IN MEMORY BOUND TO LOCAL ADDRESS WITHOUT TLS AUTO AUTHENTICATE SINGLE UNSEAL KEY V2 KU SECRET ENGINE
  • 6. SEAL UNSEAL VAULTCANSEEa VAULT starts.ws SEALED canSEE BUT STARTED STATE STORAGE UNABLETODECRYPT How UNSEAL t OBTAINMASTER KEYTO READ DECRYPTIONKEY DECRYPT DATA To WHY s DATASTOREDBYVAULTIS ENCRYPTED SHARED NEED SHAMIR v KEYS ENCRYPTIONKEY To DECRYPT Is COMBINED 50 STOREDWITH KEY INDATA i KEYRING ENCRYPTEDWITH ENCRYPTED ENCRYPTED MASTERKEY ENCRYPTEDAGAIN MASTER KEYRING But www VAULTSTORAGE UNSEALKEY UNSEALING s VAULTOPERATORUNSEAL 012 API SEALINGwine THROWAWAY UNSEAL ONCEUNSEALED MASTERKEY THEN process REMAINSUNSEALED UNLESS THESE CANBEDONE BYROOT x x x RESEALVIAAPI SERVERRESTART VAULTSTORAGE UNRECOVERABLE ERROR SEALMIGRATION from DELEGATETO use AUTO To REDUCEOPERATIONAL KMSSEAL SHAMIRSEAL SERVICE UNSEAL COMPLEXITY OF SHAMIRSEAL s KMSSEAL UNSEALKEYS KMSSEAL KMSSEAL KMS initialisation v AND SHAMIRKEYS CALLED RECOVERY KEYSGENERATED REQUIRES DOWNTIME
  • 7. LEASE RENEW AND REVOKE DYNAMIC SECRET AND LEASE s REVOKED NOFURTHERHas IE THEN SERVICETYPE RENEWALHas AVTHTOKEN r TTL AND v CHECKS WITH VAULT REGULARLY to AUDIT LOCTS LEASEID is USEDTOMANAGE LEASE DURATION LEASEOFSECRET fakes INCREMENT is FROMTHETIME OF REQUEST AND BACKEND CAN IGNOREIT PREFIXBASED HAS ABILITY TO REVOKE can REVOKE REVOCATION MULTIPLESECRETS TREE SECRETS IF GITHUB INTRUSION WITHIN 0 AUTH SPECIFICSYSTEMMETHODS s LDAP CLIENT AppROLE v ENABLE BEFORE AUTHENTICATION USE TOKENS first VERIFY GENERATE ASSOCIATE TOKEN IDENTITY THEN USEDFor VAULT REVOCATION AND RENEWAL LOGIN LEASEASSOCIATED REAUTH AFTERAGIVENPERIOD
  • 8. TOKENS TOKEN TOKENAUTH STORE BACKEND is ROOT can Do 1 TOKENS R FlAt L ANYTHING RESPONSIBLE FOR CREATINGANDSTORING TOKENS SETTONEVER AND EXPIRE CANNOT BEDISABLED EEE'm ftp.rnLEEazfEoYofEEformT ME GENERATE WITHPERMISSION of Quorum UNSEALKEY SHOULDONLY BEUSED HOLDERS FORINITIALSETUP OR EMERGENCY TOKEN SERVICETOKEN HOLDER CREATETOKEN TYPES f CHILDTOKEN NORMAL TOKENS PARENT CHILDTOKEN REVOKES ALL BATCH OR ORPHAN TOKEN ENCRYPTED BLOBS VAULT ACTIONS NOPFRENT REQUIRE NOSTORAGE REVOKETHETOKEN 9 TOKEN TOKEN ACCESSOR RENEWTHETOKENh Accessors CREATED CREATEDAND RETURNED N LOOKUPTOKEN TOKENCAPABILITIES PROPERTIES EXAMPLE USE ANOTHER SERVICE service JOB ID JOBCOMPLETE CREATES TOKEN STORES ACCESSOR REVOKEWHEN AND FINISHED
  • 9. TOKENS CONTINUED GENERAL IF NO IT IS COMPARED TO MAX TTL EXPLICIT TTL TOKENS L MAX TTL SYSTEMMAYTTL EXPLICIT HARD IGNORES VALUESET a COMBINATION 32DAYS TTL LIMIT 134AUTH v METHOD BASEDON MOUNT CANOVERRIDE THESYSTEMMAX SYSTEMS PERIODICALLY PERFORMTASK PERIODIC LONG RUNNING 502 CONNECTION TOKENS SERVICES POOL OUTSIDE OFROOT ONLY OTHER WAY TO HAVE UNLIMITED LIFETIME U MUSTRENEW WITHIN CONFIGURED PERIOD BOUND TO GDR CIDR BOUND TOKENS RESTRICT CLIENTS WHO CAN USE
  • 10. RESPONSE WRAPPING REQUESTS SERVER 7 1 NEEDS TLS PRIVATEKEY RETURNSSINGLEUSETOKEN CUBBYHOLE RESPONSE WRAPPING L LIMIT LIFETIME PROVIDECOVER OF FORSECRET DETECT SECRETEXPOSURE INFORMATION MALFEASANCE NOT SECRET SINGLEPARTYCAN WRAPPING IS BUTREFERENCE UNWRAPAND SEE SEPERATEFROM SECRET RESPONSE DOES NOT CONTAIN WRAPPING THE SECRET WRAPPED ACCESSOR TOKENS u INSTEAD 5 CREATION PATH L v J TTL OF WRAPPING TOKEN CREATION TOKEN TIME
  • 11. POLICIES EVERYTHING IN VAULT IS PATHBASED AND POLICES IS NO EXCEPTION GRANT FORBID ACCESS To CERTAIN PATHS OPERATIONS DENY BY DEFAULT DOESNOTSTORE DELEGATESAUTHMETHOD I CONNECTAUTHBACKEND LDAP SECURITY ADMIN TEAM 2 AUTHORVAULT TEAM Policy g ya µq a POLICY ADOUGROUPDEV TO READONLYDEVINVAULT 3ATTACHVAULT F TOKEN x O T4 1 CONNECTAUTHBACKEND POLICY CLIENTSrUSERS 4 RETURNTOKEN 2verifycresswithAUTH v LDAP SYNTAX PATH Secret EXAMPLE capabilities create read update delete list GRANTS ALLACCESSONSECRET T D PARAMETER PROVIDE FINE GRAINED CONTROL FINE TRAINE CONSTRAINTS OVER PERMITTED DENIEDOPERATIONS CONTROL REQUIRE Set Min maxRESPONSEWRAPPING TTLS
  • 12. POLICIES CONTINUED CANNOT BE REMOVED DEFAULT BUILT IN POLICY POLICIES ATTACHED TO ALL TOKENS ROOT CANNOT BEMODIFIED ORREMOVED POLICY USERCANDOANYTHING DELETINGPOLICIES a MANACTING LISTING POLICIES Hautdelete syspolicyltestpolicy vault read systpolicy POLICIES u v UPDATING POLICIES CREATING POLICIES vaultwritesystpolicyltestpolicy Vaultpolicywrite testpolicy testpolicyhcl policy updated policyJson
  • 13. HIGH AVAILABILITY MODE HA AUTOMATICALLY ENABLED IF DATA STORE SUPPORTS 1 I T CHECK IF HAAVAILABLE NEXTTODS 0N SERVER BOTH TRY GRAB LOCK I 9 SUCCESSFUL ACTIVE NODE DATA ELSE STANDBY NODE STORE IF STANDBYNODEGETSREQUEST FORWARD REDIRECTDEPENDINGONSTATE REDIRECTION MODE MUST BE MET FORHA CLUSTER TO WORK UNSEALED SERVER TO writesInformation 1 STANDBY SERVERCOMMUNICATION ABOUTSELF READ NODES ACTIVE VAULT STORAGE NOTCOMMUNICATED OVERNETWORK CLIENT X VAULT NO REQUEST FORWARDING REDIRECTION IF NONEMPTYVALVE REDIRECTCLIENTWITH307CODETOACTIVENODE I REDIRECTADDRESS DIRECT apiaddr SHOULD BETHATNODES ADDRESS ACCESS THISSHOULDBEAVOIDED LOAD THELB MUSTBEAWAREOFTHEBALANCERS ACTWELEADERORREDIRECTS WILLLOOP
  • 14. INTEGRATED STORAGE VAULT 1.4 INTEGRATED STORAGE HA SEMANTICS ENTERPRISE REPLICATION BACKUPANDRESTORE CONSENSUS PROTOCOL TO REPLICATE DATTA TO EACH SERVER IN CLUSTER JOIN NODE USE SAME SEAL MECHANISM JOIN REPLICATE
  • 15. PGP GPG AND KEYBASE OPENPGP COMPATIBLE PROGRAMS VAULT GPG a INTEGRATION KEYBASE IO PREVAULT 0.3 SECUREMESSAGING ANDUNSEALKEYSIN FILE SHARING PLAINTEXT GIVENTOINITIAL USER BAD VAULT UNSEAL KEY DISTRIBUTION GENERATE UNSEAL KEYANDIMMEDIATELY e INITIALISING WITH PGP ENCRYPT USING GIVENUSERS PUBLIC PGPKEYS IMPORT APPROPRIATE KEYS KEYBASE GPG 1 SIMPLE AND KEY MANAGEMENT
  • 16. RECOVERY MODE AUTOMATICALLY UNSEALED ONCE RECOVERY TOKEN ISSUED RECOVERY TOKEN OPERATIONS AND 5451RAW ENDPOINT WON'T FORM CLUSTERS OR HANDLE REQUEST FROMSTANDBY RAFT INTEGRATE STORAGE IS MAIN REASON r AUTO RESIZE CLUSTER TO 1 THEN REJOIN RAFT CLUSTER