kentik Product Updates logo
Back to Homepage Subscribe to Updates

Product Updates

Latest features, improvements, and product updates on Kentik's Network Observability platform.

Labels

  • All Posts
  • Improvement
  • Hybrid Cloud
  • Core
  • Service Provider
  • UI/UX
  • Synthetics
  • Insights & Alerting
  • DDoS
  • New feature
  • BGP Monitoring
  • MyKentik Portal
  • Agents & Binaries
  • Kentik Map
  • API
  • BETA
  • Flow
  • SNMP
  • NMS
  • AI

Jump to Month

  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • July 2021
  • June 2021
  • May 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • October 2020
  • September 2020
  • June 2020
  • February 2020
  • August 2019
  • June 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • September 2018
  • August 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • April 2016
ImprovementCore
a year ago

RBAC extends to Credentials Vault

Not so long ago, we released the Credentials Vault capability, which lets you centrally manage credentials used by Kentik NMS to poll your devices. This allowed for a much more efficient way to provision NMS devices in Kentik:

  • without having to redefine the same credentials for each device
  • supporting the need to swap the credentials used by Kentik for a large amount of devices in a central way

The Credentials Vault was released including Synthetic Monitoring capabilities to let users leverage centrally defined credentials from the Vault in the authentication steps of all forms of HTTP and Transaction Tests.

We are also currently extending the Credentials Vault-only method  from Kentik NMS to flow devices - as you know, both SNMP polling and BGP MD5 config info for these is still currently stored at a local, device-per-device level. This should feature should be released in the weeks to come, and once done, both NMS and Flow devices will both exclusively leverage the Credentials Vault.

Yet, this post focuses another aspect of Credentials Vault that we are improving today.

What is RBAC for Credentials Vault ?

When we created Credentials Vault, we relied on our legacy User Levels (Member, Admin, SuperAdmin) to go with simple defaults: basically Members cannot create any credentials but can list/use them, while only Admins and SuperAdmins are allowed to create/update/delete credentials - and this all seemed like reasonable defaults.

We have heard from a few Customers that their Synthetic Testing users were Member type users allowed to create and author Synthetic Tests, but were blocked because they weren't allowed to create credentials. The corollary being that these users would need to ask Admin users to register these secrets for them in their place, increasing the risk surface of leaking them when needing to send them over email or chat.

We agreed that this was not the most secure approach to it and took the opportunity to roll Credentials Vault into our RBAC framework.

How can you add RBAC permissions to users to let them create Credentials in the Vault?

Users with the ability to create and edit RBAC roles will now be able to assign these new permissions to roles (and in turn the users these roles are assigned to)

Beyond this, the label-based permission framework has been made available to Secrets in the Credentials Vault so that users can for instance only have access for view and edit to secrets with specific labels.

For instance, the following Vault Secret Creators role will allow users in this role to:

  • to create secrets
  • only view and use secrets labeled Production or CDN
  • only update credentials with the CDN label

So to conclude, if you need your low-privilege Member users to be able to create credentials, a speedy option is to

  1. create a new RBAC Role containing the "Can create credential secret" permission enabled
  2. directly add users to that role from the "Users" tab of the same screen
  3. profit.


Avatar of authorGreg Villain