Basic Configuration¶
For authenticating on a Vault server, each node needs credentials. Currently supported authentication methods are AppRoles and tokens.
To ease the management overhead, this extension allows the Salt master to distribute configuration and credentials to minions on demand. Thus, you only need to configure the master for the general case.
Issued credentials can either be tokens or AppRoles again.
Note
It’s generally recommended to authenticate with and distribute AppRoles because this is more secure and allows for advanced behavior. For simplicity, this extension currently defaults to token authentication/issuance though.
Hint
You can explicitly choose to configure each minion manually instead of relying on
the master (config_location
). From here on, this guide assumes you are
setting up a Salt master for credential orchestration.
Security¶
It is highly recommended that you have a general understanding of the Vault authentication and authorization mechanisms that you intend to use with this extension and how this usage fits into your security model.
The following is a non-exhaustive list of points to consider:
Using templating with grains might allow minions to access Vault policies they are not supposed to since they control the content themselves. Consider using pillars or hard coding policies instead.
In general, minions should never be allowed to mutate their own pillar, otherwise the pillar’s trustworthiness degrades to the level of grains. Specifically, if you employ the Vault pillar module, a minion must not have write access to its pillar’s source path.
Using AppRole authentication allows the Salt Master to create roles with arbitrary policies. A compromised Salt Master can thus escalate its privileges within the Vault namespace. In the present, this cannot be worked around with parameter constraints in a sensible way. This may not be a problem if the Salt Master manages the Vault server already or if it is dedicated to Salt.
Prerequisites¶
A Vault server (cluster).
Authentication credentials for the Salt master.
A policy allowing the Salt master access to token issuance endpoints:
# This is the required Salt master policy for issuing Tokens. # Issue tokens path "auth/token/create" { capabilities = ["create", "read", "update"] } # Issue tokens with Token Roles # You can substitute the glob with the role name the master is configured with path "auth/token/create/*" { capabilities = ["create", "read", "update"] }
A Token Role and policies as needed. This is not strictly required, but if omitted, issued minion tokens will be bound to the Salt master one’s and be able to inherit all its policies.
A Vault server (cluster).
A separate (unused) mount of the AppRole auth backend, called
salt-minions
by default.Authentication credentials for the Salt master.
A policy allowing the Salt master access to AppRole issuance endpoints:
# This is the required Salt master policy for issuing AppRoles. # Note that credentials should be issued from a distinct mount, # not the one the Salt master AppRole is configured at. # This separate mount is called `salt-minions` by default. # List existing AppRoles path "auth/salt-minions/role" { capabilities = ["list"] } # Manage AppRoles # This enables the Salt Master to create roles with arbitrary policies. path "auth/salt-minions/role/*" { capabilities = ["read", "create", "update", "delete"] } # Lookup mount accessor path "sys/auth/salt-minions" { capabilities = ["read", "sudo"] } # Lookup entities by alias name (role-id) and alias mount accessor path "identity/lookup/entity" { capabilities = ["create", "update"] allowed_parameters = { "alias_name" = [] "alias_mount_accessor" = ["auth_approle_0a1b2c3d"] } } # Manage entities with name prefix salt_minion_ path "identity/entity/name/salt_minion_*" { capabilities = ["read", "create", "update", "delete"] } # Create entity aliases – you can restrict the mount_accessor. # This might allow privilege escalation in case the Salt master # is compromised and the attacker knows the entity ID of an # entity with relevant policies attached - although you might # have other problems at that point. path "identity/entity-alias" { capabilities = ["create", "update"] allowed_parameters = { "id" = [] "canonical_id" = [] "mount_accessor" = ["auth_approle_0a1b2c3d"] "name" = [] } }
Policies for minions as needed.
Salt master configuration¶
Credential orchestration¶
To allow minions to pull configuration and credentials from the Salt master,
add this segment to the master configuration, e.g. in /etc/salt/master.d/peer_run.conf
:
peer_run:
.*:
- vault.get_config
- vault.generate_new_token
peer_run:
.*:
- vault.get_config
- vault.generate_secret_id
Required parameters¶
All parameters for this extension should be put under the vault
key inside the
configuration, e.g. in /etc/salt/master.d/vault.conf
.
Master authentication¶
vault:
auth:
token: <your-auth-token>
server:
url: https://vault.example.org:8200
vault:
auth:
method: approle
role_id: <your-salt-master-role-id>
secret_id: <your-salt-master-secret-id>
server:
url: https://vault.example.org:8200
Credential issuance¶
By default, token issuance endpoints restrict assignment to only a subset of the requester’s policies and tie the child token’s validity to the parent token. This configuration requires the Salt master to possess all policies it assigns to minions. Additionally, it allows minions to potentially inherit token issuance authorizations.
To overcome these restrictions without relying on sudo
capabilities, it is highly
recommended to configure a Token Role. This allows for specifying assignable
policies without these constraints and optionally enables the “orphaning” of child tokens,
allowing them to remain valid beyond the Salt master token’s expiration.
vault:
issue:
token:
role_name: <your-token-role>
See the Nomad Token Role docs for details.
vault:
issue:
type: approle
Common customizations¶
A couple of configuration values are not required, but commonly customized.
Cache¶
For historical reasons, this extension currently defaults to not employing a persistent cache.
This is a very inefficient setup and does not work with long-lived leases, so you should
configure a persistent cache
:
vault:
cache:
backend: disk # synonyms: file, localfs
Credential validity¶
Depending on your usage of Vault, the validity defaults for issued credentials might have to be customized.
Again for historical reasons, token issuance has very inefficient defaults. For each request to Vault, the minion will request a new token by default. It is generally recommended to raise the defaults:
vault:
issue:
token:
explicit_max_ttl: 30 # Tokens will be valid for 30s
num_uses: 10 # Tokens will be limited to 10 uses
The defaults are sane for light usage.
Policies¶
Authenticated clients need associated authorizations to be useful. Policies describe the operations a client is allowed to perform.
By default, minions receive the following named policies:
saltstack/minions
saltstack/<minion_id>
Important
You need to create these policies yourself. Missing policies do not cause errors, but minions are left with the default permissions only if none of the assigned policies exist.
You can customize which policies are assigned to minions. They can be templated.
vault:
policies:
assign:
- salt_minion
- salt_minion_{minion}
- salt_role_{pillar[roles]}
Note
AppRole policies and entity metadata are generally not updated automatically. After a change, you will need to synchronize them by running vault.sync_approles or vault.sync_entities respectively.
Entity metadata¶
You can customize the metadata
that is written to Vault
when creating Entities. Templating is supported. This metadata can then
be used in a templated Vault policy, reducing the need for boilerplate policies a lot:
vault:
metadata:
entity:
minion-id: '{minion}'
role: '{pillar[role]}'
This allows you to create a single policy like:
path "salt/data/minions/{{identity.entity.metadata.minion-id}}" {
capabilities = ["create", "read", "write", "delete", "patch"]
}
path "salt/data/roles/{{identity.entity.metadata.role}}" {
capabilities = ["read"]
}
Important
Entities are only created when issuing AppRoles, not tokens.
Complete examples¶
vault:
auth:
# This master authenticates with an AppRole, but
# issues tokens
method: approle
role_id: e5a7b66e-5d08-da9c-7075-71984634b882
secret_id: 841771dc-11c9-bbc7-bcac-6a3945a69cd9
cache:
backend: disk
issue:
type: token
token:
role_name: salt_minion
params:
explicit_max_ttl: 30
num_uses: 10
policies:
assign:
- 'salt_minion'
- 'salt_role_{pillar[roles]}'
server:
url: https://vault.example.com:8200
vault:
auth:
method: approle
approle_mount: approle # <-- mount the Salt master authenticates at
role_id: e5a7b66e-5d08-da9c-7075-71984634b882
secret_id: 841771dc-11c9-bbc7-bcac-6a3945a69cd9
cache:
backend: disk
issue:
type: approle
approle:
mount: salt-minions # <-- mount the Salt master manages
metadata:
entity:
minion-id: '{minion}'
role: '{pillar[role]}'
server:
url: https://vault.example.com:8200