-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
List all secret paths a user has permission to view #5362
Comments
+1 |
I am also facing the same issue. Any update on this? |
I'm facing the same issue as well, a workaround for this issue is to supply manually the secret path in the URL, like this: |
Hi @catsby, do you know if there's an estimation to when (if at all) this issue will be resolved? |
This issue seriously limits the usefulness of Vault usage by humans because they would have to remember the path to each and every secret they have access to or the organization should give blanket By reading other issues about similar requests it seems that the stated position regarding policies is that filtering API replies using them will not be implemented. Is that position still standing? And if so, how is this specific issue going to be fixed if replies cannot be filtered? |
+1 |
2 similar comments
+1 |
+1 |
+1 This is holding us back as well. We are using role based generators. Without developing systems/documentation to show users what roles (paths) they have access to, users are required to click on each path to see which they can use with trial and error. |
+1 Some sort of filtering of |
+1 |
+1 |
1 similar comment
+1 |
+1 |
+1 |
Same as above |
+1 |
1 similar comment
+1 |
+1 |
2 similar comments
+1 |
+1 |
+1 |
+1 |
Claire, thanks for the response. I'm afraid #12626 does not resolve the issue here. This issue is primarily cause by a discrepancy in user expectations between vault's UI and API. Primarily, the UI treats paths like "folders" and users expect to browse those as they would Windows Explorer or Mac's Finder. However, the policy information required to make those "folders" appear (so users know what they can see in Vault) is overly broad, so it shows too much. Removing the policy that makes "folders" appear certainly solves the problem of too many folders appearing but it makes the situation worse because people then can't browse vault at all. The changes you demonstrated in #12626 assume that the user already knows the paths they have access to, as if they were accessing the API path directly. This is not the case. In larger deployments people gain access by group membership and vault spaces are managed across dozens or hundreds of projects at a time. Users do not have individual knowledge of the vault policy or specific, individual paths of secrets in the API and rely on browsing the "folders" to find their space and secrets. |
Have the same issue. Must like cbednarski, my users primarily operate through the UI and expect to be able to traverse like normal folders. Because of my setup, I cannot have users having list permissions at the root level and seeing everyone else's secrets, even if its just that the secret exists. It would be helpful if a user has access (lets say list permissions to a path), that that path show up in the UI like a normal folder would. |
At present, that simply isn't part of Vault's feature set, though. Perhaps @hellobontempo can give us an update on whether HashiCorp is still looking in to:
The original requester probably isn't still around nearly 5 years after opening the issue, so the |
I am still around :) @maxb didnt realize they were waiting for me to respond. reviewing now |
Oh! Well, give a response so HashiCorp take the |
hello @hellobontempo the convo bw you and @cbednarski is a better description of the true issue. i agree the request is not resolved yet thank you for getting back to us though and considering this issue :D |
FWIW the Thank you all for following up! If folks give me the thumbs up, I'll rename this issue to |
Hello following up 👋 I apologize for all of the back and forth but as we're working on this now I want to make we address this correctly ✔ With the policy above, are you able to update the URL manually and list the secrets you'd like to? The path would look something like Surfacing the above view (instead of manually changing the URL 😓 ) at least aligns with the CLI where a user can view the |
Partially addressed by # #22502 |
I would like to have this in the API, not just in the UI, so that my app can get all the secrets it has permission, rather than getting each path individually. |
This could also prove beneficial for other confidential secret engines such as databases. Currently, we are tasked with overseeing numerous database roles, which poses a significant challenge for users when sifting through an extensive list of roles, especially considering that they often lack access to most of them. The implementation of a list filtering policy at API level will be highly advantageous. |
This worked for me.
|
+1 |
@UlascanY With those updated permissions, what did you run to see what paths you had access to? |
path "user-kv/data/{{identity.entity.name}}/*"
As far as I remember :) |
Hello @hellobontempo, is there any update on this? As far as I can tell, there is still no way to give users list access to only the paths they have access to and have them see only those subdirectories in the UI. I can only seem to grant access to list all the subdirectories in KV. If I do not do that, the search prompt comes up when the user enters the KV engine. Still think @cbednarski 's description of the issue is the best in this thread. |
Hi @tot19 - not yet. List-based permissions (that is, only listing items a user has access to) is still in the works. |
Almost 6 years and an essential feature like this one is still missing, I don't understand how you expect to charge companies hundreds of thousands of $ a year without improving the product in any way. |
Hello folks! We appreciate the feedback here. Our product managers are looking for folks willing to chat in deeper detail (ie via Zoom). Please email me (heather dot ezell, at hashicorp dot com) if you're willing to set up a deeper-dive conversation around your needs. |
Dear @heatherezell. I believe your message is not appropriate for this thread. Other users might get the impression that the discussion has shifted to another channel of communication, such as personal or corporate correspondence. However, this is not the case. It is very kind of you to post this self-promotion here. About a year or six months ago, a representative of your team reached out to me and asked for feedback on the Vault Web UI. As a user of the product, I tried to provide as detailed feedback as possible. However, time has passed, and I haven’t seen any changes. Meanwhile, the issue discussed in this thread is soon to be seven years old. It needs to be addressed. |
Is your feature request related to a problem? Please describe.
Currently, for our users to be able to navigate the vault GUI, we need to apply
path "secret/*" { capabilities = ["list"] }
to that user. Without it, they receive an error after they click into the secret engine (see pic). However, when we grant that permission, the user can then list ALL secrets. From a user stand point, this is confusing because they can list every secret in our vault but cannot access the actual secret.Describe the solution you'd like
it would be great for our users to be able to list (view in the gui) only secret paths that they have access to and not see secret paths if they dont have access.
Describe alternatives you've considered
Cant think of any.. probably the current solution is the only other alternative: grant secret/* list
Explain any additional use-cases
We're using 0.11 enterprise preimum + hsm with a kv2 secret engine. The guide ive been following is: https://www.vaultproject.io/docs/secrets/kv/kv-v2.html#acl-rules and https://support.hashicorp.com/hc/en-us/articles/360000953148-Vault-UI-Secrets-Navigation
In the example below, ive also tried in the CLI with the same results:
Taf policy
The text was updated successfully, but these errors were encountered: