Configure Vault's LDAP authentication backend with Jumpcloud.
Issues a Vault token with the attached Nomad policy.
This module aligns with LDAP Auth Method
Add a module and assign a nomad policy for the tokens that will be issued.
- Prerequisite: You should have the JumpCloud CA Chain in your terraform-root/tls path, or provide a path to it via
jumpcloud_ad_cert_filename
variable "jumpcloud_group_policy" {
default = {
Engineering : {
policies : ["vault-ops-policy", "vault-identity-mgmt-policy"]
identities : {
ops : { disabled : false }
}
}
QA : {
policies : ["vault-qa-policy"]
identities : {
qa : { disabled : true }
}
}
}
}
module "vault-ldap-jumpcloud" {
source = "./modules/terraform-vault-ldap-jumpcloud"
jumpcloud_ad_bindpass = var.vault_jumpcloud_ad_bindpass
jumpcloud_ad_binduid = var.vault_jumpcloud_ad_binduid
jumpcloud_ad_orgid = var.vault_jumpcloud_ad_orgid
jumpcloud_group_policy = var.jumpcloud_group_policy
}
- write local vault dev example
- write tests