-
Notifications
You must be signed in to change notification settings - Fork 25
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support Service Account Impersonation #99
Comments
https://developers.google.com/admin-sdk/directory/v1/guides/delegation#go So, how could I get service token while impersonating certain user account? Otherwise a) can't get access to API b) audit is usually built per impersonated account (checked with JWT access to API), so it is kinda must have. |
i've implemented a variation of this FR here as a side feature of Credential Access Boundary with vault (not as part of true gcp secrets engine) https://github.com/salrashid123/vault-plugin-secrets-gcp-cab#impersonated-token usage is like this
note, the code in that repo is not officially supported by google (its really a POC/demonstration of CAB where i threw in impersonation for good measure) edit: one way to add it into vault gcp secrets maybe with a diff the following variation of gcp secrets handles returning OIDC and JWTAccessTokens which could be adapted with the cab impersonation thing |
here's a sample POC support for impersonation on a fork of this repo https://github.com/salrashid123/vault-plugin-secrets-gcp#impersonated (to note, thats just alpha stage code as i've ran that w/o that much testing and its def unsupported by google as well) |
For our case, we create the same static-account using the same GCP SA across multiple mounts/clusters. Unfortunately, because every static-account creates a new GCP SA key we quickly run into the 10 key hard quota limit. Our use case is certainly unique but I really like the idea of being able to create a static-account/roleset with This obviously puts an onus on the operator to ensure that GCP permissions are configured such that the plugin can impersonate a SA to create an access token but I think having this as an option to work around the 10 key limit is a great idea. Additionally, this seems more in line with how the AWS secret plugin works for |
Closing this as done by #129. |
The
access_token
secret type should support impersonating a chain of one or more service accounts.The impersonation can be done via:
The text was updated successfully, but these errors were encountered: