<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Debug School: Navuru SrinivasaRao</title>
    <description>The latest articles on Debug School by Navuru SrinivasaRao (@srinivasaraonavuru_771).</description>
    <link>https://www.debug.school/srinivasaraonavuru_771</link>
    <image>
      <url>https://www.debug.school/images/iM3pDYSUt_CMI_3fxtQdQYSn4w7r7GZHi0IWoFMJpls/rs:fill:90:90/g:sm/mb:500000/ar:1/aHR0cHM6Ly93d3cu/ZGVidWcuc2Nob29s/L3VwbG9hZHMvdXNl/ci9wcm9maWxlX2lt/YWdlLzEzNC83OWNk/NWZlNC05YjIyLTQw/NGItOTdhNi05OGQ3/ZThmNDc0ZTcucG5n</url>
      <title>Debug School: Navuru SrinivasaRao</title>
      <link>https://www.debug.school/srinivasaraonavuru_771</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://www.debug.school/feed/srinivasaraonavuru_771"/>
    <language>en</language>
    <item>
      <title>What is Policy and Process of creating sample Policy?</title>
      <dc:creator>Navuru SrinivasaRao</dc:creator>
      <pubDate>Tue, 11 Oct 2022 13:12:05 +0000</pubDate>
      <link>https://www.debug.school/srinivasaraonavuru_771/what-is-policy-and-process-of-creating-sample-policy-4lfe</link>
      <guid>https://www.debug.school/srinivasaraonavuru_771/what-is-policy-and-process-of-creating-sample-policy-4lfe</guid>
      <description>&lt;p&gt;Policies&lt;/p&gt;

&lt;p&gt;Everything in Vault is path-based, and policies are no exception. Policies provide a declarative way to grant or forbid access to certain paths and operations in Vault.&lt;br&gt;
Policies are deny by default, so an empty policy grants no permission in the system.&lt;br&gt;
Capabilities&lt;/p&gt;

&lt;p&gt;Each path must define one or more capabilities which provide fine-grained control over permitted (or denied) operations. As shown in the examples above, capabilities are always specified as a list of strings, even if there is only one capability.&lt;/p&gt;

&lt;p&gt;To determine the capabilities needed to perform a specific operation, the -output-policy flag can be added to the CLI subcommand. For an example, refer to the Print Policy Requirements document section.&lt;/p&gt;

&lt;p&gt;The list of capabilities include the following:&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;create (POST/PUT) - Allows creating data at the given path. Very few parts of Vault distinguish between create and update, so most operations require both create and update capabilities. Parts of Vault that provide such a distinction are noted in documentation.

read (GET) - Allows reading the data at the given path.

update (POST/PUT) - Allows changing the data at the given path. In most parts of Vault, this implicitly includes the ability to create the initial value at the path.

patch (PATCH) - Allows partial updates to the data at a given path.

delete (DELETE) - Allows deleting the data at the given path.

list (LIST) - Allows listing values at the given path. Note that the keys returned by a list operation are not filtered by policies. Do not encode sensitive information in key names. Not all backends support listing.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;vault token create -policy=accounting&lt;br&gt;
vault policy write accounting accounting-fixed.hcl&lt;/p&gt;

</description>
    </item>
    <item>
      <title>What are types of Tokens and use case of it</title>
      <dc:creator>Navuru SrinivasaRao</dc:creator>
      <pubDate>Tue, 11 Oct 2022 13:04:13 +0000</pubDate>
      <link>https://www.debug.school/srinivasaraonavuru_771/what-are-types-of-tokens-and-use-case-of-it-501f</link>
      <guid>https://www.debug.school/srinivasaraonavuru_771/what-are-types-of-tokens-and-use-case-of-it-501f</guid>
      <description>&lt;p&gt;Token Types&lt;/p&gt;

&lt;p&gt;As of Vault 1.0, there are two types of tokens: service tokens and batch tokens.&lt;br&gt;
Root Tokens&lt;br&gt;
Periodic Tokens&lt;br&gt;
Service Tokens&lt;/p&gt;

&lt;p&gt;Service tokens are what users will generally think of as "normal" Vault tokens. They support all features, such as renewal, revocation, creating child tokens, and more. They are correspondingly heavyweight to create and track.&lt;/p&gt;

&lt;p&gt;»Batch Tokens&lt;/p&gt;

&lt;p&gt;Batch tokens are encrypted blobs that carry enough information for them to be used for Vault actions, but they require no storage on disk to track them. As a result they are extremely lightweight and scalable, but lack most of the flexibility and features of service tokens.&lt;/p&gt;

&lt;p&gt;Token Type Comparison&lt;/p&gt;

&lt;p&gt;This reference chart describes the difference in behavior between service and batch tokens.&lt;br&gt;
    Service Tokens  Batch Tokens&lt;br&gt;
Can Be Root Tokens  Yes No&lt;br&gt;
Can Create Child Tokens Yes No&lt;br&gt;
Can be Renewable    Yes No&lt;br&gt;
Can be Periodic Yes No&lt;br&gt;
Can have Explicit Max TTL   Yes No (always uses a fixed TTL)&lt;br&gt;
Has Accessors   Yes No&lt;br&gt;
Has Cubbyhole   Yes No&lt;br&gt;
Revoked with Parent (if not orphan) Yes Stops Working&lt;br&gt;
Dynamic Secrets Lease Assignment    Self    Parent (if not orphan)&lt;br&gt;
Can be Used Across Performance Replication Clusters No  Yes (if orphan)&lt;br&gt;
Creation Scales with Performance Standby Node Count No  Yes&lt;br&gt;
Cost    Heavyweight; multiple storage writes per token creation Lightweight; no storage cost for token creation&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Top 5 Commands working with Policy</title>
      <dc:creator>Navuru SrinivasaRao</dc:creator>
      <pubDate>Tue, 11 Oct 2022 12:55:07 +0000</pubDate>
      <link>https://www.debug.school/srinivasaraonavuru_771/top-5-commands-working-with-policy-3nc5</link>
      <guid>https://www.debug.school/srinivasaraonavuru_771/top-5-commands-working-with-policy-3nc5</guid>
      <description>&lt;p&gt;vault token create -policy=accounting&lt;br&gt;
vault policy list &lt;br&gt;
vault policy write secrets-mgmt secrets-mgmt.hcl&lt;br&gt;
vault policy read secrets-mgmt&lt;br&gt;
vault write auth/userpass/users/ned token_policies="secrets-mgmt"&lt;br&gt;
vault policy delete accounting&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Top 5 Commands working with tokens</title>
      <dc:creator>Navuru SrinivasaRao</dc:creator>
      <pubDate>Tue, 11 Oct 2022 12:48:05 +0000</pubDate>
      <link>https://www.debug.school/srinivasaraonavuru_771/top-5-commands-working-with-tokens-2jkp</link>
      <guid>https://www.debug.school/srinivasaraonavuru_771/top-5-commands-working-with-tokens-2jkp</guid>
      <description>&lt;p&gt;vault token create -policy=default -ttl=60m&lt;br&gt;
vault token create -type=batch -policy=default -ttl=30m&lt;br&gt;
vault token lookup TOKEN_VALUE&lt;br&gt;
vault token lookup -accessor ACCESSOR_VALUE&lt;br&gt;
vault token revoke -accessor ACCESSOR_VALUE&lt;br&gt;
vault token renew $batch_id&lt;br&gt;
vault token renew -increment=784h&lt;br&gt;
vault token revoke -self&lt;/p&gt;

</description>
    </item>
    <item>
      <title>What is top 10 use cases of Hashicorp Vault?</title>
      <dc:creator>Navuru SrinivasaRao</dc:creator>
      <pubDate>Mon, 10 Oct 2022 13:34:19 +0000</pubDate>
      <link>https://www.debug.school/srinivasaraonavuru_771/what-is-top-10-use-cases-of-hashicorp-vault-51me</link>
      <guid>https://www.debug.school/srinivasaraonavuru_771/what-is-top-10-use-cases-of-hashicorp-vault-51me</guid>
      <description>&lt;p&gt;HashiCorp Vault is an identity-based secrets and encryption management system. Vault validates and authorizes clients (users, machines, apps) before providing them access to secrets or stored sensitive data.&lt;/p&gt;

&lt;p&gt;database credential management, Vault can manage your Active Directory accounts, SSH keys, PKI certificates and more. &lt;/p&gt;

&lt;p&gt;Data Encryption&lt;br&gt;
Static Secrets&lt;br&gt;
Dynamic Secrets&lt;br&gt;
Identity-Based Access&lt;br&gt;
Key Management&lt;/p&gt;

</description>
    </item>
    <item>
      <title>5 Use Case of Approle and Userpass Authentication Methods</title>
      <dc:creator>Navuru SrinivasaRao</dc:creator>
      <pubDate>Mon, 10 Oct 2022 13:28:52 +0000</pubDate>
      <link>https://www.debug.school/srinivasaraonavuru_771/5-use-case-of-approle-and-userpass-authentication-methods-14di</link>
      <guid>https://www.debug.school/srinivasaraonavuru_771/5-use-case-of-approle-and-userpass-authentication-methods-14di</guid>
      <description>&lt;p&gt;The approle auth method allows machines or apps to authenticate with Vault-defined roles. The open design of AppRole enables a varied set of workflows and configurations to handle large numbers of apps. This auth method is oriented to automated workflows (machines and services), and is less useful for human operators.&lt;/p&gt;

&lt;p&gt;An AppRole can be created for a particular machine, or even a particular user on that machine, or a service spread across machines. The credentials required for successful login depend upon the constraints set on the AppRole associated with the credentials&lt;/p&gt;

&lt;p&gt;The userpass auth method allows users to authenticate with Vault using a username and password combination.&lt;/p&gt;

&lt;p&gt;The username/password combinations are configured directly to the auth method using the users/ path. This method cannot read usernames and passwords from an external source.&lt;/p&gt;

&lt;p&gt;we can use it on our different environment such as Dev,QA etc.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Top 10 Commands for Hashicorp Vault Learnt Today?</title>
      <dc:creator>Navuru SrinivasaRao</dc:creator>
      <pubDate>Mon, 10 Oct 2022 13:23:16 +0000</pubDate>
      <link>https://www.debug.school/srinivasaraonavuru_771/top-10-commands-for-hashicorp-vault-learnt-today-2b5d</link>
      <guid>https://www.debug.school/srinivasaraonavuru_771/top-10-commands-for-hashicorp-vault-learnt-today-2b5d</guid>
      <description>&lt;p&gt;vault login&lt;br&gt;
vault server -dev &lt;br&gt;
vault auth enable userpass&lt;br&gt;
vault auth list&lt;br&gt;
vault auth tune -description&lt;br&gt;
vault path-help auth/userpass/&lt;br&gt;
vault write auth/userpass/users/ned password=tacos&lt;br&gt;
vault read auth/approle/role/webapp/role-id&lt;br&gt;
vault write -force auth/approle/role/webapp/secret-id&lt;br&gt;
vault auth disable &lt;/p&gt;

</description>
    </item>
    <item>
      <title>List of Authentication Methods in Hashicorp Vault</title>
      <dc:creator>Navuru SrinivasaRao</dc:creator>
      <pubDate>Mon, 10 Oct 2022 13:14:55 +0000</pubDate>
      <link>https://www.debug.school/srinivasaraonavuru_771/list-of-authentication-methods-in-hashicorp-vault-4ee8</link>
      <guid>https://www.debug.school/srinivasaraonavuru_771/list-of-authentication-methods-in-hashicorp-vault-4ee8</guid>
      <description>&lt;p&gt;Token&lt;br&gt;
userpass&lt;br&gt;
approle&lt;br&gt;
AliCloud&lt;br&gt;
azure cloud&lt;br&gt;
GCP&lt;br&gt;
Oracle Cloud&lt;br&gt;
Kerberos Auth Method&lt;br&gt;
Kubernetes Auth Method&lt;br&gt;
RADIUS Auth Method&lt;br&gt;
LDAP Auth Method&lt;br&gt;
TLS Certificates Auth Method&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
