Skip to content

Instantly share code, notes, and snippets.

Created October 24, 2018 01:00
  • Star 1 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
Star You must be signed in to star a gist
What would you like to do?
// , Shows how to "conveniently" map AD groups to Vault Policies.
super-duper-vault-train $ls
LICENSE initpayload.json instance7_consul_http_token.txt instance7_vault_consul_http_token.txt
Vagrantfile playbooks provision_consul provision_vault
super-duper-vault-train $cd provision_vault/
provision_vault $ls data_production_gap scripts
data data_sandbox_gap
provision_vault $cd scripts/
scripts $ls secrets_consumer_of_buyplan.hcl secrets_consumer_of_new_relic_agent.hcl secrets_consumer_of_sriramapp.hcl secrets_owner_of_buyplan.hcl secrets_owner_of_new_relic_agent.hcl secrets_owner_of_sriramapp.hcl ssantha_ldap_vault_login_example.txt testaccess.hcl
scripts $./ldapgrouper
-bash: ./ldapgrouper: No such file or directory
scripts $./
Usage: (--ldap_group <group> | --ldap_user <user>) --vault_policy <policy> [<MOUNT_POINT>] --list (-h | --help)
scripts $./ --ldap_group MY-AD-GROUP --vault_policy admin
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment