-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathsample-policy.hcl
46 lines (40 loc) · 999 Bytes
/
sample-policy.hcl
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
# Vault Policy file for user roger
# Access to secret/roger
path "secret/roger/*" {
capabilities = ["create", "read", "update", "delete", "list"]
}
# Ability to change password
path "auth/userpass/users/roger/password" {
capabilities = ["update"]
}
# Ability to see their own policy
path "sys/policies/acl/roger" {
capabilities = ["read"]
}
# Additional access for UI
path "secret/" {
capabilities = ["list"]
}
path "secret/roger" {
capabilities = ["list"]
}
path "sys/mounts" {
capabilities = ["read", "list"]
}
path "sys/policies/acl/" {
capabilities = ["list"]
}
# Ability to provision Kubernetes auth backends
path "sys/auth/roger*" {
capabilities = ["sudo", "create", "read", "update", "delete", "list"]
}
path "sys/auth" {
capabilities = ["read", "list"]
}
path "auth/roger*" {
capabilities = ["create", "read", "update", "delete", "list"]
}
# Needed for the Terraform Vault Provider
path "auth/token/create" {
capabilities = ["create", "read", "update", "list"]
}