LDAP_ADDR='ldap://192.168.50.40:389' ; root@vaults0:/home/vagrant# vault write auth/ldap/config url="${LDAP_ADDR}" \ bindpass="admin"
12 results for "vagrant"
-
LDAP recursive group mapping on vault ldap auth method with various policies
-
BOUNDARY - To provide admin access to a Kubernetes Cluster
authority-data}' | base64 -d > ca.crt root@vaults0:/home/vagrant/boundarySetup# vault write -f kubernetes/config kubernet -
Image Encryption and Decryption via Vault
root@vaults0:/home/vagrant# base64 -w 0 absolute_path_of_image > base64_image.txt example:- root@vaults0:/home/vagrant# ls -ltr -
Vault Database Secrets Engine - MSSQL minimum permission to create the dynamic credentials
database secret engine for mssql plugin root@vaults0:/vagrant/scripts# vault write database/config/my-mssql-database p -
Username Templating Scenarios for Vault secrets engines
8 random characters as seen below: root@vaults0:/home/vagrant# vault write database/config/my-cassandra-database plugi -
Prevent Vault from Brute Force Attack - User Lockout
lockout parameter until we change it root@vaults0:/home/vagrant# vault read sys/auth/userpass/tune #Key -
EGP Generic Sentinel policy to restrict the role name
EGP_POLICY with Base64 encoding:: root@vaults0:/home/vagrant/sentinel# EGP_POLICY=$(base64 -i restrict-role-name.sentinel) -
Engaging with HashiCorp Support
documentation. Vagrant Relevant Vagrant output and logs which are useful to share for Vagrant issues include: vagrant command -
Templates - Using nomad attributes when creating PKI certificates with Vault
successfully, and no errors are seen. root@nomad-server-1:/vagrant# nomad run -var="tls_domain=test4.global.nomad" -var="alt_names=client -
Subscribe to HashiCorp Release Updates
pages Boundary Consul Nomad Packer Terraform Vagrant Vault Waypoint