3-add-example-for-periodic-orphan-token #4
							
								
								
									
										34
									
								
								README.md
									
									
									
									
									
								
							
							
						
						
									
										34
									
								
								README.md
									
									
									
									
									
								
							| @@ -224,6 +224,40 @@ Write down the generated `client_token`. | |||||||
|  |  | ||||||
| Lastly don't forget to create some key value pairs underneath `kv/rbacgroup_remco` that the token can access. | Lastly don't forget to create some key value pairs underneath `kv/rbacgroup_remco` that the token can access. | ||||||
|  |  | ||||||
|  | #### Token lifecycle management | ||||||
|  |  | ||||||
|  | Revoke an orphan token like so via Vault CLI client. See [Authenticate against Vault](#authenticate-against-vault) at the top for how to authenticate your Vault CLI client and then: | ||||||
|  | ``` | ||||||
|  | vault token revoke -accessor <token-accessor-here>. | ||||||
|  | ``` | ||||||
|  |  | ||||||
|  | Find all orphan tokens by their accessor like so. This requires `list` access to `auth/token/accessors`. Members of the `administrators` group outlined above have this. | ||||||
|  | ``` | ||||||
|  | vault list -format json auth/token/accessors |\ | ||||||
|  |     jq -r .[] |\ | ||||||
|  |     xargs -I '{}' vault token lookup -format json -accessor '{}' |\ | ||||||
|  |     jq -r 'select((.data.entity_id=="") and (.data.orphan==true) and (.data.path=="auth/token/create-orphan"))' | ||||||
|  | ``` | ||||||
|  |  | ||||||
|  | Output will for example look like: | ||||||
|  | ``` | ||||||
|  | { | ||||||
|  |   "request_id": "170d8a93-7b61-9ec2-9df7-ad7a8ca0be88", | ||||||
|  |   "lease_id": "", | ||||||
|  |   "lease_duration": 0, | ||||||
|  |   "renewable": false, | ||||||
|  |   "data": { | ||||||
|  |     "accessor": "66IzIsoOpXycYqF33JmfIb8G", | ||||||
|  |     ... | ||||||
|  |     "entity_id": "", | ||||||
|  |     ... | ||||||
|  |   }, | ||||||
|  |   "warnings": null | ||||||
|  | } | ||||||
|  | ``` | ||||||
|  |  | ||||||
|  | Where the `accessor` ID (here `66IzIsoOpXycYqF33JmfIb8G`) is what you're going to want to use in your CLI command `vault token revoke`. | ||||||
|  |  | ||||||
| ## Clean-up | ## Clean-up | ||||||
|  |  | ||||||
| If during any of the above steps you've used the Vault command-line client to authenticate against Vault with your `root` token make sure that client's `~/.vault-token` file is deleted. It contains the verbatim `root` token. | If during any of the above steps you've used the Vault command-line client to authenticate against Vault with your `root` token make sure that client's `~/.vault-token` file is deleted. It contains the verbatim `root` token. | ||||||
|   | |||||||
		Reference in New Issue
	
	Block a user