<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>oidc on Strongly Branched</title>
    <link>https://stronglybranched.io/tags/oidc/</link>
    <description>Recent content in oidc on Strongly Branched</description>
    <generator>Hugo -- gohugo.io</generator>
    <managingEditor>stronglybranched@outlook.com (Tony)</managingEditor>
    <webMaster>stronglybranched@outlook.com (Tony)</webMaster>
    <copyright>©2019</copyright>
    <lastBuildDate>Mon, 08 Jun 2020 14:15:00 +0200</lastBuildDate>
    
	<atom:link href="https://stronglybranched.io/tags/oidc/index.xml" rel="self" type="application/rss+xml" />
    
    
    <item>
      <title>Azure AD OIDC auth in HashiCorp Vault using Terraform</title>
      <link>https://stronglybranched.io/2020/06/azure-ad-oidc-auth-in-hashicorp-vault-using-terraform/</link>
      <pubDate>Mon, 08 Jun 2020 14:15:00 +0200</pubDate>
      <author>stronglybranched@outlook.com (Tony)</author>
      <guid>https://stronglybranched.io/2020/06/azure-ad-oidc-auth-in-hashicorp-vault-using-terraform/</guid>
      <description>HashiCorp Vault ©HashiCorp
   I recently had to set up a HashiCorp Vault server for a client. Due to the requirements, I got to do some new things with regards to Vault authentication. Some of the stated requirements were:
 Authentication to Vault should be done by using Azure Active Directory Use of Azure AD Application Roles for permissions instead of groups Configure Vault via Terraform  While I&amp;rsquo;ve done quite a bit with Vault and OAuth 2.</description>
    </item>
    
  </channel>
</rss>