Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature Request: Secrets Manager Integration for short-lived secrets #29621

Open
FireDrunk opened this issue Jul 26, 2023 · 1 comment
Open
Labels
feature-request Used for new features in Teleport, improvements to current should be #enhancements

Comments

@FireDrunk
Copy link
Contributor

FireDrunk commented Jul 26, 2023

What would you like Teleport to do?
Teleport could have either a Plugin (API) or builtin support to allow pushing short-lived secrets to external Secret Providers like Hashicorp Vault, AWS Secrets Manager, or Azure Keyvault.

What problem does this solve?
When using short-lived containers (like Kubernetes (Cron)Jobs) or CI jobs, authentication using Machine ID is a bit tricky.
When you have the automatic certificate generation / rollover embedded in Teleport itself it would free up a log of complex logic for CI jobs.

The way I would see this working, is using a dedicated Resource like a "SecretProvider".
This should describe which account would be used, and to which keyvault and secret key it would link. A TTL would describe the interval in which Teleport would generate an auth file and upload it to the linked secret provider.

CI Jobs (or other tasks), can just use credential from the keyvault. There could even be standard ServiceConnections in Azure containing the correct information to connect to Teleport.

If a workaround exists, please include it.
The current setup is based on Machine ID with long lived CI runners, that can generate credentials on the fly. One could build such a setup themselves with Machine ID, and use these machines to run the other CI jobs.

Another workound (which we currently use), is having custom Pipelines which contact Teleport to generate an auth file and manually insert it into an Azure Keyvault. This pipeline is quite complex and error-prone.

@FireDrunk FireDrunk added the feature-request Used for new features in Teleport, improvements to current should be #enhancements label Jul 26, 2023
@flavono123
Copy link

another case to solve:

using a rotation feature of external secret provider with a static token of teleport(maybe not recommended, btw, but for convenience for integrating with the customer's rotation system)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature-request Used for new features in Teleport, improvements to current should be #enhancements
Projects
None yet
Development

No branches or pull requests

2 participants