Skip to content

ryanbynoe/aws_password_manager

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

AWS Password Manager

Simpsons

Office

Password manager using Passbolt through AWS

Table of Contents

Project Overview

  • Leveraging AWS and Passbolt to successfully create a self-hosted password manager to store sensitive information (passwords) and manage them enforcing data protection.

  • Implementing HTTPS encryption to safeguard sensitive data trasnsmitted to and from the password manager

  • Configure and maintain the domain hosting for the password manager, ensuring accessibility and security.

Tools Used

  • AWS
  • VirtualBox (Ubuntu)
  • PassBolt
  • Namecheap -(Domain)

Demo

Passbolt

- Get started with the Community version of Passbolt Pro.
- Select AWS and then press Deploy to AWS
- After subscribing, I proceeded with the default setup.

Passbolt

- Setup a new security group to allow traffic for Passbolt

PassboltSG - Created a new key pair and dragged file into my Ubuntu under PASSBOLT.pem on virtual machine desktop. PassboltKP - Successful launch of EC2 instance from Passbolt and in AWS. (Instance has to initialize and be checked) PassboltS PassboltEC2

AWS

- After EC2 has been initialized, I copied the public IPv4 address and opened in new tab of web browser. Caveat: entered http:// in front of the IPv4 address. Https is not configured yet.

PassboltHTTP

Connecting to EC2 Instance from Ubuntu VM

In the terminal of the Ubuntu machine, ensure to change the permissions so the key isn't publically viewable and then ssh into the ec2 isntance.

            cd Desktop   
            chmod 400 "PASSBOLT.pem"
            ssh -i PASSBOLT.pem admin@[ec2ipv4 address]

EC2Connect

Nginx Configuration

    sudo nano /etc/nginx/sites-enabled/nginx-passbolt.conf

Updated server name to my domain I purchased from namecheap. EC2Connect

sudo dpkg-reconfigure passbolt-ce-server

Passbolt Server Config

PassConfig PassConfig2 PassConfig3

  • The next steps I entered in my domain site and admin for the domain site.

PassConfi4 PassConfi5

  • When successful should display similar to below. If failed, ensure the correct domain site is entered in the nginx config.

PassConfi6

  • Navigate to the domain site and SSL access should be enabled SSLenabled

After all the configuration has been completed in Passbolt, I downloaded the extensions and downloaded the passkit provided. It also presented me with a security token.

Sectoken

Password Manager

Password manager has been successfully setup

PassMan

Terminate Instance

Term

Credits

Credits to Pavel Hrabec

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published