Join David Swersky for an in-depth discussion in this video Secure introduction approaches, part of Learning HashiCorp Vault.
- [Narrator] Suppose you work for a company…that uses and maintains an application…that stores its data in a transactional database.…This application runs on application-tier servers,…and authenticates to its relational database…using a username and password.…The username and password combination is a secret.…You don't want that secret permanently stored…in the application configuration,…so you decide to use Vault to store it.…By the way, we could use the database secrets engine,…to solve this problem, but let's just assume,…for argument's sake, that we want to use this method…to deploy an application…with a static username and password.…
We might, for example, be connecting to a database…that is not supported by the database secrets engine.…Here's a diagram of a proposed solution.…The application is built by a continuous…integration system such as Jenkins.…The CI system authenticates to Vault,…using AppRole, Role ID, and Secret ID,…getting an access token.…The CI system then generates a new token…for the application to use to authenticate to Vault.…
Author
Released
9/20/2018- What is Vault?
- Using the dev server
- Working with Vault secrets engines
- Adding policies to Vault
- Running and using Vault
- Configuring the database secrets engine
- Implementing Vault
- Integrating Jenkins with Vault
- Using the Vault API
Skill Level Beginner
Duration
Views
Related Courses
-
Learning Vagrant
with David Swersky1h 35m Beginner -
Learning Terraform
with Adron Hall2h 20m Intermediate -
Learning Docker
with Arthur Ulfeldt2h 35m Beginner -
DevOps Foundations: Infrastructure as Code
with Ernest Mueller2h 6m Intermediate
-
Introduction
-
What you should know2m 35s
-
Setting up your environment1m 41s
-
1. Introduction to Vault
-
What is Vault?3m 39s
-
Vault cryptography3m 24s
-
-
2. Getting Started with Vault
-
Using the dev server5m 9s
-
Vault authentication6m 50s
-
Vault policies overview3m 33s
-
Adding policies to Vault5m 23s
-
-
3. Running and Using Vault
-
Running a Vault server2m 21s
-
Running the containers5m 18s
-
SSH secrets engine overview1m 38s
-
SSH secrets engine set up6m 44s
-
-
4. Implementing Vault
-
Integrating Jenkins with Vault14m 18s
-
Vault response wrapping1m 46s
-
5. Using the Vault API
-
Conclusion
-
Next steps with Vault1m 23s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Secure introduction approaches