hashicorp_vault::ssh_client
: This class will configure the functionvault_ssh
to make it easier to ssh to machines using keys signed by Hashicorp Vault Usage: `vault_sshashicorp_vault::ssh_server
: This class will configure the node to use a host key signed by Hashicorp Vault Authentication to the Vault server will be done using the Pupp
hashicorp_vault::lib_binary
: This class should not be directly called
This class will configure the function vault_ssh
to make it easier to ssh to machines using keys signed by Hashicorp Vault
Usage: vault_ssh ${server}
The following parameters are available in the hashicorp_vault::ssh_client
class:
Data type: String
The url for the Hashicorp Vault server
Data type: Enum['ldap']
The authentication method that will be used with Hasicorp Vault
This class will configure the node to use a host key signed by Hashicorp Vault Authentication to the Vault server will be done using the Puppet node's certificate
The following parameters are available in the hashicorp_vault::ssh_server
class:
Data type: String
The url for the Hashicorp Vault server
Data type: Optional[String]
The public key from the SSH engine that will be trusted. vault_ssh_engine is not needed if this is defined
Default value: undef
Data type: Optional[String]
The engine name within the Hashicorp Vault server for the ssh CA so the key can be downloaded from the server.
vault_public_key is not needed if this is defined.
NOTICE: Because Hashicorp Vault dynamically generates the page,
Puppet will always see the file as changed and will re-write the CA file.
Default value: undef