okta

archit0/okta/vault

Terraform Module HCL VAULT
Install
module "okta" {
source = "archit0/okta/vault"
version = "1.0.0"
}
plain text: /constructs/tfmod-archit0-okta-vault/install.txt
⭐ Source on GitHub 📦 Registry page
README

terraform-vault-okta Terraform configuration to configure Vault with Okta using the OIDC auth plugin Setting up Okta OIDC Auth For this to work, you'll need to be an Okta administrator: Setting up Groups Let's create two groups: vault_admins or something similar. These groups will be given permissions to do things within Vault. Within those groups, let's add some users in the Okta Admin console. Configuring the Authorization Server Okta has a default authorization server that you can either edit or create another one. You get to this setting by going to Security > API > Authorization Servers. For this, we'll create a new one. New Authorization Server for Vault Click Add Authorization Server. For name enter Vault, for audience enter api://vault, and then enter a meaningful description. Upda

Inputs (10)
NameTypeDescriptionDefault
okta_client_secretstringOkta Vault app client secret required
okta_bound_audienceslistA list of allowed token audiences required
okta_client_idstringOkta Vault app client ID required
okta_discovery_urlstringOkta Authz server Issuer URI: i.e. https://<org>.okta.com/oauth2/<id> required
vault_addrstringVault address in the form of https://domain:8200 required
auth_redirectstringPort to open locally to login with the CLI"http://localhost:8250/oidc/callback"
okta_allowed_groupslistOkta group for Vault admins[ "vault_admins" ]
okta_mount_pathstringMount path for Okta auth"okta_oidc"
rolesmapMap of Vault role names to their bound groups and token policies. See terraform.{}
cli_portnumberPort to open locally to login with the CLI8250
Resources (2)
vault_jwt_auth_backendvault_jwt_auth_backend_role
Details
FrameworkTerraform Module
LanguageHCL
Version1.0.0
Cloud VAULT
★ Stars0
Forks1
Total downloads785
Inputs10
Resources2
Namespacearchit0
Updated