Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Dynamic Secrets for Azure Service Principal #24

Open
quincycheng opened this issue Jan 28, 2021 · 6 comments
Open

Dynamic Secrets for Azure Service Principal #24

quincycheng opened this issue Jan 28, 2021 · 6 comments

Comments

@quincycheng
Copy link

Request for a new public Conjur project in CyberArk GitHub

Current project source: https://github.com/quincycheng/azure-jit

Current maintainer: Quincy Cheng, @quincycheng

Desired project URL: https://github.com/cyberark/azure-jit

Brief description of project:
Conjur Dynamic Secrets for Azure Service Principal

Anticipated certification level: Community

@izgeri
Copy link
Contributor

izgeri commented Feb 1, 2021

Is this also a demo of using Conjur for JIT access in Azure? If so, it would fall under the comment here: #23 (comment)

If not, we'll want to revise the repo name so that it's clear what it contains. It should have a reference to conjur. Can you share a bit longer description of what the project includes? Thanks!

@quincycheng
Copy link
Author

It's a feature, that can dynamically create & remove Azure Service Principle on the fly, based on micro-service architecture
Just like what Hashicorp vault does

@doodlesbykumbi
Copy link

Hi @quincycheng. Could you please confirm my understanding? I see that the idea is using Conjur as a secret and config store, retrieving those values as needed at runtime to create a temporary identity in a service. So it’s dynamic secrets at the level of service identity.

I think I can see this existing in something like conjur-dynamic-secrets , the functionality being that Conjur is used to store the "root" service credentials and this project would bundle up a list of "provider/generators"s (e.g. MySQL, GCP, AWS, Azure) that can use the "root" credentials to create JIT expiring identities whose credentials are created and retrieved on request (then also stored in Conjur in this example? but I’m not sure you generally want that).

This would be deployed as a service that can be authenticated against using Conjur credentials. The credentials would determine the permissions on dynamic secret generation so that a consumer of this service need never have access to the "root" credentials.

@quincycheng
Copy link
Author

Yup, the description is very well written! thanks @doodlesbykumbi

@izgeri
Copy link
Contributor

izgeri commented Feb 9, 2021

Thanks @doodlesbykumbi and @quincycheng! This is one project I know touches on part of our product roadmap for JIT application access - I'm checking with the product org to see how this project could fit in / what we'd like to call it before I start to create a home for it.

@izgeri
Copy link
Contributor

izgeri commented Feb 9, 2021

@quincycheng is this just for Azure or are you planning to add other use cases? Asking as we're considering the naming of the repo.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Development

No branches or pull requests

3 participants