-
Notifications
You must be signed in to change notification settings - Fork 103
Entrust KeyControl
The Entrust KeyControl implementation is work in progress (PR: xyz) and not available, yet.
This guide shows how to setup a KES server that uses Entrust KeyControl as a persistent key store:
╔═════════════════════════════════════════════════╗
┌────────────┐ ║ ┌────────────┐ ┌────────────────────┐ ║
│ KES Client ├───────────╫──┤ KES Server ├──────────┤ Entrust KeyControl │ ║
└────────────┘ ║ └────────────┘ └────────────────────┘ ║
╚═════════════════════════════════════════════════╝
Entrust KeyControl is a proprietary KMS that provides a secret store that can be used by KES.
This guide assumes that you have setup an Entrust KeyControl v10.1 cluster. For setting up a Entrust KeyControl cluster checkout the Entrust documentation:
1. Create a new Vault
First, login into your KeyControl cluster as secroot
and create a new PASM Vault.
2. Login into Vault
Now, login into your KeyControl cluster as Vault admin (as specified when creating the Vault). The Vault admin should have received an email with a one-time password. The Vault URL can also be viewed in the Vault details tab:
3. Create a new Box
Once logged into the KeyControl Vault, create a new Box under Manage Boxes
.
Do not set a checkout or rotation duration.
3. Attach the 'Vault User' role policy
Now create a new policy with the Vault User
role and attach the policy to the user account
used by KES.