Vault

  • By Canonical Telco
Channel Revision Published Runs on
latest/edge 89 31 Jan 2024
Ubuntu 22.04 Ubuntu 20.04
latest/edge 9 27 Jan 2023
Ubuntu 22.04 Ubuntu 20.04
1.16/stable 259 23 Jul 2024
Ubuntu 22.04
1.16/candidate 259 23 Jul 2024
Ubuntu 22.04
1.16/beta 259 23 Jul 2024
Ubuntu 22.04
1.16/edge 274 Today
Ubuntu 22.04
1.15/stable 248 24 Jul 2024
Ubuntu 22.04
1.15/candidate 248 24 Jul 2024
Ubuntu 22.04
1.15/beta 248 24 Jul 2024
Ubuntu 22.04
1.15/edge 248 10 Jul 2024
Ubuntu 22.04
juju deploy vault-k8s --channel 1.16/edge
Show information

Platform:

Use Vault as an intermediate CA

In this how-to guide, we will configure Vault to act as an intermediate Certificate Authority (CA) using Vault’s PKI secrets engine. Here self-signed-certificates will be the parent CA and tls-certificates-requirer will be the charm requesting a certificate to Vault.

  1. Configure Vault’s common name
  • Note: Vault PKI will only allow issuing certificates for the subdomains of the common_name configured here, it will reject any requests using differnt domains in their subject.
juju config vault common_name=mydomain.com
  1. Deploy the parent CA
juju deploy self-signed-certificates
  1. Integrate Vault with its parent CA
juju integrate vault:tls-certificates-pki self-signed-certificates
  1. Deploy tls-certificates-requirer
juju deploy tls-certificates-requirer --config common_name=demo.mydomain.com
  1. Integrate TLS Certificates Requirer with Vault
juju integrate tls-certificates-requirer vault:vault-pki
  1. Retrieve the certificate
juju run tls-certificates-requirer/leader get-certificate