Skip to content

Instantly share code, notes, and snippets.

@kawsark
Last active August 1, 2024 10:27
Show Gist options
  • Save kawsark/4cdb66093d6206d9e036ecd1294e6509 to your computer and use it in GitHub Desktop.
Save kawsark/4cdb66093d6206d9e036ecd1294e6509 to your computer and use it in GitHub Desktop.

Revisions

  1. kawsark revised this gist Oct 12, 2020. 1 changed file with 1 addition and 1 deletion.
    2 changes: 1 addition & 1 deletion example-vault-admin-policy.hcl
    Original file line number Diff line number Diff line change
    @@ -25,7 +25,7 @@ path "sys/auth"
    # List existing policies
    path "sys/policies/acl"
    {
    capabilities = ["read"]
    capabilities = ["read","list"]
    }

    # Create and manage ACL policies
  2. kawsark renamed this gist Jun 27, 2019. 1 changed file with 0 additions and 0 deletions.
    File renamed without changes.
  3. kawsark created this gist Jun 27, 2019.
    59 changes: 59 additions & 0 deletions vault-admin-policy.hcl
    Original file line number Diff line number Diff line change
    @@ -0,0 +1,59 @@
    # Allow managing leases
    path "sys/leases/*"
    {
    capabilities = ["create", "read", "update", "delete", "list", "sudo"]
    }

    # Manage auth methods broadly across Vault
    path "auth/*"
    {
    capabilities = ["create", "read", "update", "delete", "list", "sudo"]
    }

    # Create, update, and delete auth methods
    path "sys/auth/*"
    {
    capabilities = ["create", "update", "delete", "sudo"]
    }

    # List auth methods
    path "sys/auth"
    {
    capabilities = ["read"]
    }

    # List existing policies
    path "sys/policies/acl"
    {
    capabilities = ["read"]
    }

    # Create and manage ACL policies
    path "sys/policies/acl/*"
    {
    capabilities = ["create", "read", "update", "delete", "list", "sudo"]
    }

    # List, create, update, and delete key/value secrets
    path "secret/*"
    {
    capabilities = ["create", "read", "update", "delete", "list", "sudo"]
    }

    # Manage secret engines
    path "sys/mounts/*"
    {
    capabilities = ["create", "read", "update", "delete", "list", "sudo"]
    }

    # List existing secret engines.
    path "sys/mounts"
    {
    capabilities = ["read"]
    }

    # Read health checks
    path "sys/health"
    {
    capabilities = ["read", "sudo"]
    }