Kubernetes
Kubernetes can function as an OIDC provider such that Vault can validate its service account tokens using JWT/OIDC auth.
Note: The JWT auth engine does not use Kubernetes' TokenReview
API
during authentication, and instead uses public key cryptography to verify the
contents of JWTs. This means tokens that have been revoked by Kubernetes will
still be considered valid by Vault until their expiry time. To mitigate this
risk, use short TTLs for service account tokens or use
Kubernetes auth which does use the TokenReview
API.
Use service account issuer discovery
When using service account issuer discovery, you only need to provide the JWT auth mount with an OIDC discovery URL, and sometimes a TLS certificate authority to trust. This makes it the most straightforward method to configure if your Kubernetes cluster meets the requirements.
Kubernetes cluster requirements:
ServiceAccountIssuerDiscovery
feature enabled.- Present from 1.18, defaults to enabled from 1.20.
- kube-apiserver's
--service-account-issuer
flag is set to a URL that is reachable from Vault. Public by default for most managed Kubernetes solutions. - Must use short-lived service account tokens when logging in.
- Tokens mounted into pods default to short-lived from 1.21.
Configuration steps:
Ensure OIDC discovery URLs do not require authentication, as detailed here:
Find the issuer URL of the cluster.
Enable and configure JWT auth in Vault.
If Vault is running in Kubernetes:
Alternatively, if Vault is not running in Kubernetes:
Note: When Vault is outside the cluster, the
$ISSUER
endpoint below may or may not be reachable. If not, you can configure JWT auth usingjwt_validation_pubkeys
instead.Configure a role and log in as detailed below.
Use JWT validation public keys
This method can be useful if Kubernetes' API is not reachable from Vault or if you would like a single JWT auth mount to service multiple Kubernetes clusters by chaining their public signing keys.
Kubernetes cluster requirements:
ServiceAccountIssuerDiscovery
feature enabled.- Present from 1.18, defaults to enabled from 1.20.
- This requirement can be avoided if you can access the Kubernetes master
nodes to read the public signing key directly from disk at
/etc/kubernetes/pki/sa.pub
. In this case, you can skip the steps to retrieve and then convert the key as it will already be in PEM format.
- Must use short-lived service account tokens when logging in.
- Tokens mounted into pods default to short-lived from 1.21.
Configuration steps:
Fetch the service account signing public key from your cluster's JWKS URI.
Convert the keys from JWK format to PEM. You can use a CLI tool or an online converter such as this one.
Configure the JWT auth mount with those public keys.
Configure a role and log in as detailed below.
Create a role and logging in
Once your JWT auth mount is configured, you're ready to configure a role and log in. The following assumes you use the projected service account token available in all pods by default. See Specifying TTL and audience below if you'd like to control the audience or TTL.
Choose any value from the array of default audiences. In these examples, there is only one audience in the
aud
array,https://kubernetes.default.svc.cluster.local
.To find the default audiences, either create a fresh token (requires
kubectl
v1.24.0+):Or read a token from a running pod's filesystem:
Create a role for JWT auth that the
default
service account from thedefault
namespace can use.Pods or other clients with access to a service account JWT can then log in.
Specify TTL and audience
If you would like to specify a custom TTL or audience for service account tokens,
the following pod spec illustrates a volume mount that overrides the default
admission injected token. This is especially relevant if you are unable to
disable the --service-account-extend-token-expiration
flag for kube-apiserver
and want to use short TTLs.
When using the resulting token, you will need to set bound_audiences=vault
when creating roles in Vault's JWT auth mount.