You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/docs/configuration/vault.md
+201Lines changed: 201 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,6 +47,207 @@ spec:
47
47
...
48
48
```
49
49
50
+
### Accessing a Vault Server with mTLS enforced
51
+
52
+
In certain use cases, the Vault Server could be configured to enforce clients to present a
53
+
client certificates, those client certificates are just a transport layer enforcement,
54
+
it does not provide any authentication and authorization mechanism to the Vault APIs itself.
55
+
You can read more about the Vault server TCP listener [in the official documentation](https://developer.hashicorp.com/vault/docs/configuration/listener/tcp)
56
+
57
+
Please follow the steps below to configure Vault with mTLS enforced:
58
+
- Generate the bundle CA and the server TLS certificate:
59
+
```shell
60
+
step certificate create "Example Server Root CA" server_ca.crt server_ca.key \
- Prepare the Vault installation, assuming you would be installing Vault in the Kubernetes cluster using the [official Helm chart](https://github.com/hashicorp/vault-helm):
92
+
- Create the Vault namespace
93
+
```shell
94
+
kubectl create ns vault
95
+
```
96
+
- Create a Kubernetes Secret in the same namespace where Vault will be installed and add the generated PKI files as following:
0 commit comments