Dynamic credentials for Google Cloud Platform (GCP)
Dynamic secrets are a core feature in Vault. A class of dynamic secrets is on-demand, revocable, time-limited access credentials for cloud providers. For example, the Dynamic Secrets getting started tutorial demonstrated the AWS secrets engine to dynamically generate AWS credentials (access key ID and secret access key).
Challenge
To consume Google Cloud Platform (GCP) services (e.g. GCP Kubernetes service), the client must have valid GCP credentials. GCP uses service accounts to authenticate services running in GCP with other GCP services. For example, a compute engine virtual machine (VM) requires credentials to authenticate with other GCP services.
Solution
Configure Vault to generate service account keys or OAuth tokens with a time-to-live (TTL) enforcing its validity so that the credentials are automatically revoked when they are no longer used.
In this tutorial, you will configure GCP to support Vault and setup Vault to generate either a OAuth token or service account key.
Personas
The end-to-end scenario described in this tutorial involves two personas:
admin
with privileged permissions to configure Vault secrets engines and GCP resourcesapps
read the secrets from Vault
Prerequisites
This tutorial assumes the following:
- You have a Google Cloud Platform account with permission to:
- Create IAM service accounts, policies
- Enable GCP APIs
- Access the GCP Cloud Shell
- Create VMs
- Vault installed on your local machine
- jq installed
Policy requirements
Each persona requires a different set of capabilities. These are expressed in policies. If you are not familiar with policies, complete the policies tutorial.
The admin tasks require these capabilities.
The apps tasks require these capabilities.
Lab setup
Workstation setup
Create a temporary directory to store the files used for this tutorial.
Retrieve the directory path and store it in the
TUTORIAL_TEMP
environment variable.Go to the
TUTORIAL_TEMP
directory.
Vault setup
Open a new terminal window and start a Vault dev server with
root
as the root token.The Vault dev server defaults to running at
127.0.0.1:8200
. The server is initialized and unsealed.Insecure operation
Do not run a Vault dev server in production. This approach starts a Vault server with an in-memory database and runs in an insecure way.
Return to the terminal where you created the
TUTORIAL_TEMP
directory.Export an environment variable for the
vault
CLI to address the Vault server.Export an environment variable for the
vault
CLI to authenticate with the Vault server.Note
For these tasks, you can use Vault's root token. However, it is recommended that root tokens are only used for enough initial setup or in emergencies. As a best practice, use an authentication method or token that meets the policy requirements.
The Vault server is ready.
Configure GCP services for Vault
(Persona: admin)
Warning
Resources will be provisioned during this tutorial that may result in charges to your Google Cloud Platform account.
Before Vault can manage dynamic credentials using the GCP secrets engine, you need to configure the necessary resources in GCP. This includes enabling the required GCP APIs, creating a IAM service account and IAM policy for Vault, and a creating key for the service account that Vault will use to authenticate with GCP.
Open a browser and sign into the GCP console.
Click the terminal icon to launch the GCP Cloud Shell.
A new pane will open at the bottom of your window and provision a Cloud Shell instance.
In the Cloud Shell terminal, list the GCP project ID.
Note
If this is the first time using the Cloud Shell terminal, you will be prompted to authorize permission to use your credentials.
Click
Authorize
when prompted.The project ID is used when configuring both GCP and Vault.
Verify the cloud resource manager and IAM API's are enabled.
If
cloudresourcemanager.googleapis.com
andiam.googleapis.com
are not listed, expand the menu below and enable the API(s).Enable the
iam.googleapis.com
API.Enable the
cloudresourcemanager.googleapis.com
API.Create a service account for Vault to authenticate with GCP.
Create a GCP IAM role for Vault and assign the required permissions.
Retrieve the role name and store it in the
ROLE_NAME
environment variable.Retrieve the service account email and store it in the
SERVICE_ACCOUNT
environment variable.Add the Vault service account to the GCP project and bind the role to the service account.
Create a service account key credential file.
Click the More button (represented by the vertical ellipsis) and select Download.
Click the folder icon, expand the directory, select the VaultServiceAccountKey.json file, and click Download.
Store the
VaultServiceAccountKey.json
file inTUTORIAL_TEMP
directory you created in the lab setup section.Tip
Depending on your browser settings, the file may automatically download to a default directory. To complete this tutorial, make sure the
VaultServiceAccountKey.json
file is located in the$TUTORIAL_TEMP
directory.Example OSX command:
Retrieve and copy the GCP project ID from the Cloud Shell terminal.
Return to the terminal where you set the
TUTORIAL_TEMP
environment variable and set theGCP_PROJECT_ID
environment variable to the value from the previous step.You have completed the necessary configuration in GCP to support the Vault GCP secrets engine.
Configure Vault
(Persona: admin)
There are two types of credentials Vault can generate for GCP - a JSON formated service account key credential file, and an OAuth token. Each of these methods have benefits and contrstraints that need to be considered for your use case.
Service account keys have a limit of ten keys per service account. This limit can quickly be reached in large, or busy environments. Depending on the workload, this limitation can be managed by setting a low TTL that permits the workload to complete. Service keys, however, are supported across most clients and the lifetime of the key can be fully managed by Vault.
OAuth access tokens do not have any limits on the number of tokens that can be requested. This can be beneficial for large environments or when workloads have a long runtime because you will not reach the same limit as service account keys. OAuth tokens are not supported by all clients and Vault is not able to fully manage the token. All tokens have a default TTL of one hour and cannot be revoked by Vault.
New in Vault 1.13
Impersonated accounts are a way to generate an OAuth2 access token that is granted the permissions and accesses of another given service account. These access tokens do not have the same 10-key limit as service account keys do, yet they retain their short-lived nature.
Instead of Vault creating a unique service account in GCP based on the Vault roleset name, existing GCP service accounts can be impersonated to simplify the configuration. This will help alleviate reaching the 100 service account quota in GCP.
See the OAuth account impersonation tab below for more details.
In the terminal where you set the
TUTORIAL_TEMP
environment variable, enable the GCP secrets engine.Configure the GCP secrets engine to use the
VaultServiceAccountKey.json
credentials.Example output:
Define the bindings to be used by Vault in a file named
gcpbindings.hcl
.Note
The
roles/viewer
role is used in this tutorial for simplicity. You can use any predefined or custom role that provides the necessary permissions for the application.Create a Vault roleset named
edu-app-token
.Example output:
The Vault configuration is complete.
Request GCP credentials
(Persona: app)
An application can read the Vault roleset to generate a unique OAuth token.
Read the
edu-app-token
roleset to generate a new token.The token is generated with the default TTL of one hour (60 minutes).
OAuth tokens are managed by GCP, and not visible in the GCP console.
Return to the GCP console.
Expand the hamburger menu and navigate to IAM & Admin >> Service Accounts.
A service account has been created in GCP based on the Vault role name
edu-app-token
.Click the vaultedu-app-token123456789@... service account and click the KEYS tab.
The key ID associated with the service account key Vault created will be listed.
This key is required by the Vault node when it authenticates with GCP. If the token is deleted, the Vault node will not be able to authenticate with GCP and produce the following error:
Manage leases
Service token eases can be renewed or revoked by either the requesting application or by a Vault admin.
Note
OAuth tokens are not managed by Vault after creation; therefore, this step is applicable to only the service account key. Please refer to the help and reference section for more information.
Renew an existing lease
Depending on the secrets engine configuration, leases can be renewed for a service account key
up to the max_ttl
defined in the configuration. When you configured the GCP secrets engine
you defined a default ttl
of 2m
and a max_ttl
of 10m
. This means you can renew the
lease for up to a total of 10 minutes.
Read the
edu-app
roleset to generate a new key.Copy the
lease_id
and lookup details about the lease.The
ttl
will be some value less than 2 minutes.Renew the lease.
The lease duration is reset to 2 minutes.
The lease can be renewed up to the
max_ttl
value. Once themax_ttl
is reached, you will receive a message that theTTL
has been capped.The lease will expire once the
max_ttl
has been reached and can no longer be renewed.
Revoke a lease
When an application has completed the process that requires a service account key, the lease can be revoked before the TTL has expired. This is espcially useful with GCP service account keys which allow a maximum of 10 keys per service account. In large environments with multiple applications, the maxiumum number keys could be reached quickly.
Read the
edu-app-key
roleset to generate a new key.Copy the
lease_id
and lookup details about the lease.The
ttl
will be some value less than 2 minutes.Use the
lease_id
to revoke the lease early.Attempt to look up the lease again.
Example output:
The lease ID is now invalid.