You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We require the flexibility to specify the expiration for secrets associated with static Service Principals in Azure. Vault hard-codes the expiration to 10 years. Our policy requires these secrets to be rotated every 6 months and for us to set expiration dates accordingly. The TTLs we will be assigning to Azure Secrets Roles in Vault will be well short of 6 months for the most part.
The text was updated successfully, but these errors were encountered:
Add `explicit_max_ttl` to Azure role attributes. If set, Application
Secrets in Azure AD will be created with a maximum lifetime equal to
`explicit_max_ttl` instead of the hard-coded 10-year default in effect
until now.
Fixeshashicorp#178
Fixes VAULT-12316
Add `explicit_max_ttl` to Azure role attributes. If set, Application
Secrets in Azure AD will be created with a maximum lifetime equal to
`explicit_max_ttl` instead of the hard-coded 10-year default in effect
until now.
Fixeshashicorp#178
Fixes VAULT-12316
We require the flexibility to specify the expiration for secrets associated with static Service Principals in Azure. Vault hard-codes the expiration to 10 years. Our policy requires these secrets to be rotated every 6 months and for us to set expiration dates accordingly. The TTLs we will be assigning to Azure Secrets Roles in Vault will be well short of 6 months for the most part.
The text was updated successfully, but these errors were encountered: