Use Vault as an ACME Server to obtain TLS certificates¶
In this how-to guide, we will configure Vault to act as an ACME server using Vault’s PKI secrets engine. Here self-signed-certificates will be the parent CA.
The certificates issued by Vault will have a validity period that is half of its intermediate CA’s, which is determined by the root provider’s configuration, in this case, the self-signed certificates.
Note
Vault ACME will allow issuing certificates depending on how it is configured, please see acme_allow_subdomains
, acme_allowed_domains
, acme_allow_any_name
and acme_allow_wildcard_certificates
Configure Vault’s common name, and the ACME server to allow issuing certificates for subdomains and any domain name
juju config vault acme_ca_common_name=mydomain.com acme_allow_subdomains=true acme_allow_any_name=true
Deploy the parent CA
juju deploy self-signed-certificates --channel 1/stable
Integrate Vault with its parent CA
juju integrate vault:tls-certificates-acme self-signed-certificates
Now the ACME server is accessible on https://<Vault Address>:8200/v1/charm-acme/acme/directory
Now you should be able to obtain a certificate from Vault using an ACME client, for example Lego.