Skip to content

GitLab Next

  • Projects
  • Groups
  • Snippets
  • Help
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in / Register
GitLab
GitLab
  • Project overview
    • Project overview
    • Details
    • Activity
    • Releases
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
    • Locked Files
  • Issues 36,980
    • Issues 36,980
    • List
    • Boards
    • Labels
    • Service Desk
    • Milestones
    • Iterations
  • Merge requests 1,433
    • Merge requests 1,433
  • Requirements
    • Requirements
    • List
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
    • Test Cases
  • Operations
    • Operations
    • Metrics
    • Incidents
    • Environments
  • Packages & Registries
    • Packages & Registries
    • Container Registry
  • Analytics
    • Analytics
    • CI/CD
    • Code Review
    • Insights
    • Issue
    • Repository
    • Value Stream
  • Snippets
    • Snippets
  • Members
    • Members
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • GitLab.org
  • GitLabGitLab
  • Issues
  • #229354

Closed
Open
Created Jul 15, 2020 by Jackie Porter@jreporterDeveloper0 of 22 tasks completed0/22 tasks

Update and select Vault Policy for JWT in GitLab

Problem to solve

Today, users have to have a deep knowledge of HashiCorp Vault, the documentation, and bound_claims in order to effectively permission the JWT authentication from GitLab to HashiCorp. This is a painful, high switching cost experience.

Intended users

  • Delaney (Development Team Lead)
  • Sasha (Software Developer)
  • Devon (DevOps Engineer)

User experience goal

In the CICD settings at the Group and Project level, I would like to be able to select a Vault Policy to scope my JWT for Vault authentication.

Proposal

  • Connect Vault Policies to CICD Settings
  • Add a "HashiCorp Vault Policies" section
  • Dropdown/open url path field to select a human-readable Vault Policy for a JWT

Permissions and Security

Project-Level:

  • Members with no access (0)should not be able to get to CICD settings and therefore cannot access Vault Policies
  • Guest (10) members should not be able to get to CICD settings and therefore cannot access Vault Policies
  • Reporter (20) members should not be able to get to CICD settings and therefore cannot access Vault Policies
  • Developer (30) members should not be able to get to CICD settings and therefore cannot access Vault Policies
  • Maintainer (40) members can select a Vault Policy
  • Owner (50) members can select a Vault Policy

Group & Subgroup-Level:

  • Members with no access (0)should not be able to get to CICD settings and therefore cannot access Vault Policies
  • Guest (10) members should not be able to get to CICD settings and therefore cannot access Vault Policies
  • Reporter (20) members should not be able to get to CICD settings and therefore cannot access Vault Policies
  • Developer (30) members should not be able to get to CICD settings and therefore cannot access Vault Policies
  • Maintainer (40) members can select a Vault Policy
  • Owner (50) members can select a Vault Policy

Documentation

  • Create documentation on https://docs.gitlab.com/ee/ci/examples/authenticating-with-hashicorp-vault/ under: https://docs.gitlab.com/ee/ci/examples/setting-a-hashicorp-vault-policy-in-gitlab/

What is the type of buyer?

GitLab Premium

cc @krasio

Edited Jul 15, 2020 by Jackie Porter
Assignee
Assign to
Backlog
Milestone
Backlog
Assign milestone
Time tracking