Venafi Connection authentication to Venafi TLS Protect Datacenter or Venafi Control Plane¶
Venafi Connection provides a variety of authentication options to connect your Kubernetes cluster to the Venafi. The following table gives a basic overview of these options compared with each other.
Product | Authentication Method | Credential Storage | Maintenance |
---|---|---|---|
Venafi Connection | Workload Identity Federation using the OIDC protocol. | Dynamically generated short-lived tokens. | One-time set-up per cluster (scriptable). |
Access Token | Long-lived access tokens stored in Kubernetes secrets or HashiCorp Vault | Requires periodic token rotation. | |
Username/Password | Long-lived username and password credentials stored in Kubernetes secrets or HashiCorp Vault. | Requires periodic password rotation. | |
Open-source cert-manager | Access Token | Long-lived access tokens stored in Kubernetes secrets. | Requires periodic token rotation |
The following sections describe the advantages and disadvantages of each approach Venafi Connection uses.
Configuring authentication using workload identity federation¶
Workload identity federation allows Venafi components for Kubernetes, such as Venafi Enhanced Issuer, to authenticate with Venafi Control Plane securely without having to manage and secure long-lived credentials (like passwords or API keys). Instead, Kubernetes can function as an OIDC provider such that Venafi Control Plane can validate its service account tokens using JWT/OIDC authentication.
This is a secretless method for authenticating with TLS Protect Datacenter or Venafi Control Plane. With this method, you don't require an access token or password. In the case of TLS Protect Datacenter this method is limited to TLS Protect Datacenter 22.4 or later.
This method also has the advantage of being a one-time setup and no credentials need to be passed between your teams.
This option offers the best choice for managing authentication as there are no long-lived credentials at all. Learn more
Configuring authentication using HashiCorp Vault¶
You have two other options when configuring Venafi Connection to work with HashiCorp Vault:
- Authenticating to Venafi TLS Protect Datacenter using a username and password stored in HashiCorp Vault.
- Authenticating to Venafi TLS Protect Datacenter using a username and password stored in LDAP by means of HashiCorp Vault's LDAP Secret Engine.
This method however also requires periodic manual rotation of passwords. Learn more
Configuring authentication using Kubernetes Secrets¶
This is the simplest authentication mechanism. In this case, the Venafi TLS Protect Datacenter access token, Venafi TLS Protect Datacenter username and password, or Venafi-as-a-Service API Key are loaded from a Kubernetes secret.
This method however requires manual rotation of tokens/passwords. Learn more