»MongoDB Atlas Secrets Engine

The MongoDB Atlas Secrets Engine generates Programmatic API keys for MongoDB Atlas. This allows one to manage the lifecycle of these MongoDB Atlas secrets through Vault. The created MongoDB Atlas secrets are time-based and are automatically revoked when the Vault lease expires, unless renewed. Vault will create a Programmatic API key for each lease scoped to the MongoDB Atlas project or organization denoted with the included role(s). An IP Whitelist may also be configured for the Programmatic API key with desired IPs and/or CIDR blocks.

The MongoDB Atlas Programmatic API Key Public and Private Key is returned to the caller. To learn more about Programmatic API Keys visit the Programmatic API Keys Doc.

»Configure Connection

In addition to the parameters defined by the Secrets Engines Backend, this plugin has a number of parameters to further configure a connection.

MethodPath
POST/mongodbatlas/config

»Parameters

  • public_key (string: <required>) – The Public Programmatic API Key used to authenticate with the MongoDB Atlas API.
  • private_key (string: <required>) - The Private Programmatic API Key used to connect with MongoDB Atlas API.
  • username_template (string) - Template describing how dynamic usernames are generated.

»Sample Payload

{
  "public_key": "yhltsvan",
  "private_key": "2c130c23-e6b6-4da8-a93f-a8bf33218830"
}
{  "public_key": "yhltsvan",  "private_key": "2c130c23-e6b6-4da8-a93f-a8bf33218830"}

»Sample Request

$ curl \
    --header "X-Vault-Token: ..." \
    --request POST \
    --data @payload.json \
    http://127.0.0.1:8200/mongodbatlas/config
$ curl \    --header "X-Vault-Token: ..." \    --request POST \    --data @payload.json \    http://127.0.0.1:8200/mongodbatlas/config

»Create/Update Programmatic API Key role

Programmatic API Key credential types create a Vault role to generate a Programmatic API Key at either the MongoDB Atlas Organization or Project level with the designated role(s) for programmatic access. If a role with the name does not exist, it will be created. If the role exists, it will be updated with the new attributes.

MethodPath
POST/roles/:name

»Parameters

  • ip_addresses (list [string] <Optional>) - IP address to be added to the whitelist for the API key. This field is mutually exclusive with the cidrBlock field.
  • cidr_blocks (list [string] <Optional>) - Whitelist entry in CIDR notation to be added for the API key. This field is mutually exclusive with the ipAddress field.

»Sample Payload

{
  "project_id": "5cf5a45a9ccf6400e60981b6",
  "roles": ["GROUP_CLUSTER_MANAGER"],
  "cidr_blocks": ["192.168.1.3/32"],
  "ip_addresses": ["192.168.1.3", "192.168.1.4"]
}
{  "project_id": "5cf5a45a9ccf6400e60981b6",  "roles": ["GROUP_CLUSTER_MANAGER"],  "cidr_blocks": ["192.168.1.3/32"],  "ip_addresses": ["192.168.1.3", "192.168.1.4"]}
$ curl \
    --header "X-Vault-Token: ..." \
    --request POST \
    --data @payload.json \
    http://127.0.0.1:8200/mongodbatlas/roles/test-programmatic-key
$ curl \    --header "X-Vault-Token: ..." \    --request POST \    --data @payload.json \    http://127.0.0.1:8200/mongodbatlas/roles/test-programmatic-key

»Sample Response

{
  "project_id": "5cf5a45a9ccf6400e60981b6",
  "roles": ["GROUP_CLUSTER_MANAGER"],
  "cidr_blocks": ["192.168.1.3/32"],
  "ip_addresses": ["192.168.1.3", "192.168.1.4"],
  "organization_id": "7cf5a45a9ccf6400e60981b7",
  "ttl": "30m",
  "max_ttl": "1h"
}
{  "project_id": "5cf5a45a9ccf6400e60981b6",  "roles": ["GROUP_CLUSTER_MANAGER"],  "cidr_blocks": ["192.168.1.3/32"],  "ip_addresses": ["192.168.1.3", "192.168.1.4"],  "organization_id": "7cf5a45a9ccf6400e60981b7",  "ttl": "30m",  "max_ttl": "1h"}

»Read Programmatic API Key role

MethodPath
GET/roles/:name

»Parameters

  • name (string <required>) - Unique identifier name of the role name

»Sample Payload

$ curl \
    --header "X-Vault-Token: ..." \
    --request GET \
    --data @payload.json \
    http://127.0.0.1:8200/mongodbatlas/roles/test-programmatic-key
$ curl \    --header "X-Vault-Token: ..." \    --request GET \    --data @payload.json \    http://127.0.0.1:8200/mongodbatlas/roles/test-programmatic-key

»Sample Response

{
  "project_id": "5cf5a45a9ccf6400e60981b6",
  "roles": ["GROUP_CLUSTER_MANAGER"],
  "cidr_blocks": ["192.168.1.3/32"],
  "ip_addresses": ["192.168.1.3", "192.168.1.4"],
  "organization_id": "7cf5a45a9ccf6400e60981b7",
  "ttl": "30m",
  "max_ttl": "1h"
}
{  "project_id": "5cf5a45a9ccf6400e60981b6",  "roles": ["GROUP_CLUSTER_MANAGER"],  "cidr_blocks": ["192.168.1.3/32"],  "ip_addresses": ["192.168.1.3", "192.168.1.4"],  "organization_id": "7cf5a45a9ccf6400e60981b7",  "ttl": "30m",  "max_ttl": "1h"}

»List Programmatic API Key role

MethodPath
GET/roles

»Sample Payload

$ curl \
    --header "X-Vault-Token: ..." \
    --request GET \
    --data @payload.json \
    http://127.0.0.1:8200/mongodbatlas/roles
$ curl \    --header "X-Vault-Token: ..." \    --request GET \    --data @payload.json \    http://127.0.0.1:8200/mongodbatlas/roles

»Sample Response

[
  {
    "project_id": "5cf5a45a9ccf6400e60981b6",
    "roles": ["GROUP_CLUSTER_MANAGER"],
    "cidr_blocks": ["192.168.1.3/32"],
    "ip_addresses": ["192.168.1.3", "192.168.1.4"],
    "organization_id": "7cf5a45a9ccf6400e60981b7",
    "ttl": "30m",
    "max_ttl": "1h"
  },
  {
    "project_id": "5cf5a45a9ccf6400e60981b6",
    "roles": ["READ"],
    "cidr_blocks": ["192.168.1.3/35"],
    "ip_addresses": ["192.168.1.5", "192.168.1.6"],
    "organization_id": "7cf5a45a9ccf6400e60981b7",
    "ttl": "30m",
    "max_ttl": "1h"
  }
]
[  {    "project_id": "5cf5a45a9ccf6400e60981b6",    "roles": ["GROUP_CLUSTER_MANAGER"],    "cidr_blocks": ["192.168.1.3/32"],    "ip_addresses": ["192.168.1.3", "192.168.1.4"],    "organization_id": "7cf5a45a9ccf6400e60981b7",    "ttl": "30m",    "max_ttl": "1h"  },  {    "project_id": "5cf5a45a9ccf6400e60981b6",    "roles": ["READ"],    "cidr_blocks": ["192.168.1.3/35"],    "ip_addresses": ["192.168.1.5", "192.168.1.6"],    "organization_id": "7cf5a45a9ccf6400e60981b7",    "ttl": "30m",    "max_ttl": "1h"  }]

»Delete Programmatic API Key role

MethodPath
DELETE/roles/:name

»Parameters

  • name (string <required>) - Unique identifier name of the role name

»Sample Payload

$ curl \
    --header "X-Vault-Token: ..." \
    --request DELETE \
    --data @payload.json \
    http://127.0.0.1:8200/mongodbatlas/roles/test-programmatic-key
$ curl \    --header "X-Vault-Token: ..." \    --request DELETE \    --data @payload.json \    http://127.0.0.1:8200/mongodbatlas/roles/test-programmatic-key

»Read Credential

MethodPath
GET/creds/:name

»Parameters

  • name (string <required>) - Unique identifier name of the credential

»Sample Request

$ curl \
    --header "X-Vault-Token: ..." \
    http://127.0.0.1:8200/mongodbatlas/creds/0fLBv1c2YDzPlJB1PwsRRKHR
$ curl \    --header "X-Vault-Token: ..." \    http://127.0.0.1:8200/mongodbatlas/creds/0fLBv1c2YDzPlJB1PwsRRKHR

»Sample Response

{
  "lease_duration": "20s",
  "lease_renewable": true,
  "description": "vault-test-1563980947-1318",
  "private_key": "905ae89e-6ee8-40rd-ab12-613t8e3fe836",
  "public_key": "klpruxce"
}
{  "lease_duration": "20s",  "lease_renewable": true,  "description": "vault-test-1563980947-1318",  "private_key": "905ae89e-6ee8-40rd-ab12-613t8e3fe836",  "public_key": "klpruxce"}