Compare commits
3 Commits
2c9cb6df90
...
30eaccb1a3
| Author | SHA1 | Date | |
|---|---|---|---|
| 30eaccb1a3 | |||
| 6c5323025b | |||
| 5050963cd5 |
7
.gitignore
vendored
7
.gitignore
vendored
@@ -1,4 +1,5 @@
|
||||
config
|
||||
data
|
||||
log
|
||||
/config
|
||||
/data
|
||||
/log
|
||||
**/*.key
|
||||
default_policy.hcl
|
||||
|
||||
@@ -32,14 +32,6 @@ path "sys/auth" {
|
||||
capabilities = ["read"]
|
||||
}
|
||||
|
||||
# Enable and manage the key/value secrets engine at `secret/` path
|
||||
|
||||
# List, create, update, and delete key/value secrets
|
||||
# path "secret/*"
|
||||
# {
|
||||
# capabilities = ["create", "read", "update", "delete", "list", "sudo"]
|
||||
# }
|
||||
|
||||
# Manage secrets engines
|
||||
path "sys/mounts/*" {
|
||||
capabilities = ["create", "read", "update", "delete", "list", "sudo"]
|
||||
|
||||
@@ -1,8 +1,13 @@
|
||||
# Add identity admin role to the token
|
||||
path "identity/*" {
|
||||
capabilities = ["create", "read", "update", "delete", "list", "sudo"]
|
||||
capabilities = ["create", "read", "update", "delete", "list"]
|
||||
}
|
||||
|
||||
path "identity/entity/*/name" {
|
||||
capabilities = ["create", "read", "update", "delete", "list", "sudo"]
|
||||
# Override default policies for identity management
|
||||
path "identity/entity/id/{{identity.entity.id}}" {
|
||||
capabilities = ["create", "read", "update", "delete", "list"]
|
||||
}
|
||||
|
||||
path "identity/entity/name/{{identity.entity.name}}" {
|
||||
capabilities = ["create", "read", "update", "delete", "list"]
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user