Skip to content

Instantly share code, notes, and snippets.

View infamousjoeg's full-sized avatar
🙊
I'm really good at keeping secrets.

Joe Garcia infamousjoeg

🙊
I'm really good at keeping secrets.
View GitHub Profile
@izgeri
izgeri / conjur-ansible-docs.md
Last active March 22, 2021 17:59
Draft documentation on the Conjur-Ansible integration

What is Ansible?

Ansible is an automation language and automation engine that lets you describe end-to-end IT application environments with a “playbook.” Ansible’s simple, human-readable language allows orchestration of your application lifecycle no matter where it’s deployed.

How Ansible Works With Conjur

Conjur Ansible integration diagram

@micahlee
micahlee / debugging_info.md
Created September 6, 2019 15:17
Conjur K8s Authenticator Debugging
  • Display role bindings for conjur-cluster service account token

    oc get clusterrolebindings -o json \
      | jq '.items | map(select(any(.subjects[]; .name | contains("conjur-cluster"))))'
    
  • Display conjur-authenticator role information

    oc describe clusterrole conjur-authenticator
    
@JimmyJamTQBD
JimmyJamTQBD / Client_Cert Cred Type.yml
Last active April 1, 2020 13:08
Ansible Tower Playbooks for retrieving credentials from Cyberark Vault to authenticate to hosts
fields:
- label: CyberArk Client Certificate
secret: true
multiline: true
help_text: Paste the contents of the client certificate for CyberArk authentication
type: string
id: cyberark_client_cert
required:
- cyberark_client_cert
@whip113
whip113 / conjur_identity.json
Last active October 9, 2018 21:13
Custom Credential for Ansible Tower - Conjur Identity
"name": "Conjur API Key",
"description": "",
"kind": "cloud",
"managed_by_tower": false,
"inputs": {
"fields": [
{
"secret": true,
"type": "string",
"id": "api_key",
@whip113
whip113 / cybr_client_cert.json
Last active October 9, 2018 21:14
Custom Credentials for Ansible Tower - CyberArk Client Certificate
"name": "Cyberark Client Certificate",
"description": "",
"kind": "cloud",
"managed_by_tower": false,
"inputs": {
"fields": [
{
"label": "Client Certificate",
"secret": true,
"multiline": true,
@whip113
whip113 / cybr_priv_key.json
Last active October 9, 2018 21:14
Custom Credentials for Ansible Tower - CyberArk Private Key
"name": "CyberArk Private Key",
"description": "Uses client certificate authentication to CyberArk CCP",
"kind": "cloud",
"managed_by_tower": false,
"inputs": {
"fields": [
{
"label": "Private Key",
"secret": true,
"multiline": true,
@jvanderhoof
jvanderhoof / sample_comjur_seccomp_profile.json
Created May 14, 2018 17:17
Sample Conjur seccomp profile (default profile with `keyctl` enabled, which provides access to underlying kernel keychain)
{
"description": "Default Docker seccomp profile, plus keyctl calls (required by Conjur)",
"comment": "Run with `docker run --security seccomp:path/to/seccomp.json` to use it.",
"defaultAction": "SCMP_ACT_ERRNO",
"architectures": [
"SCMP_ARCH_X86_64",
"SCMP_ARCH_X86",
"SCMP_ARCH_X32"
],
"syscalls": [{
@infamousjoeg
infamousjoeg / interfaces
Last active April 27, 2018 14:32 — forked from takipone/interfaces
Debian/Ubuntu /etc/network/interfaces
auto lo
iface lo inet loopback
auto ens160
iface ens160 inet static
address IP_ADDR
netmask NETMASK
gateway DEFAULT_GATEWAY
dns-nameservers DNS
@rbrayb
rbrayb / Helper.cs
Created January 14, 2018 23:45
Validating an ADFS JWT token
using System;
using System.Threading;
using System.Threading.Tasks;
namespace ValidateJWTConsoleApp
{
class Helper
{
internal static class AsyncHelper
{