https://github.com/keyfactor/ejbca-vault-pki-engine
EJBCA PKI Engine and Backend for HashiCorp Vault. Used to issue, sign, and revoke certificates using the EJBCA CA.
https://github.com/keyfactor/ejbca-vault-pki-engine
ejbca hashicorp-vault keyfactor-api-client secrets-engine
Last synced: 5 months ago
JSON representation
EJBCA PKI Engine and Backend for HashiCorp Vault. Used to issue, sign, and revoke certificates using the EJBCA CA.
- Host: GitHub
- URL: https://github.com/keyfactor/ejbca-vault-pki-engine
- Owner: Keyfactor
- License: apache-2.0
- Created: 2023-05-02T19:05:04.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2024-07-22T18:02:46.000Z (about 1 year ago)
- Last Synced: 2025-03-31T12:58:07.778Z (6 months ago)
- Topics: ejbca, hashicorp-vault, keyfactor-api-client, secrets-engine
- Language: Go
- Homepage:
- Size: 10 MB
- Stars: 8
- Watchers: 4
- Forks: 2
- Open Issues: 4
-
Metadata Files:
- Readme: README.md
- Changelog: CHANGELOG.md
- Contributing: CONTRIBUTING.md
- License: LICENSE
- Security: SECURITY.md
Awesome Lists containing this project
README
# EJBCA Vault PKI Secrets Engine

[](https://ejbca.org)
[](https://www.keyfactor.com/products/ejbca-enterprise/)
[](https://goreportcard.com/report/github.com/keyfactor/ejbca-vault-pki-engine)## Overview
The EJBCA PKI Secrets Engine for HashiCorp Vault enables DevOps teams to request and retrieve certificates
from EJBCA using HashiCorp Vault, while security teams retain control over backend PKI operations.The secrets engine is built on top of the [EJBCA REST API](https://doc.primekey.com/ejbca/ejbca-operations/ejbca-ca-concept-guide/protocols/ejbca-rest-interface)
and uses the [EJBCA Go Client SDK](https://github.com/Keyfactor/ejbca-go-client-sdk) for programmatic access.
The EJBCA PKI Secrets Engine is a Vault plugin that replicates the built-in Vault PKI secrets engine, but processes
requests through EJBCA instead of through Vault. The plugin was designed to be swapped for the built-in Vault PKI secrets engine
with minimal changes to existing Vault configurations.## Requirements
### To build
* [Git](https://git-scm.com/)
* [Golang](https://golang.org/) >= v1.22### To use
* [EJBCA](https://www.keyfactor.com/products/ejbca-enterprise/) >= v7.7
* [HashiCorp Vault](https://www.vaultproject.io/) >= v1.11.0## Getting Started
To get started with EJBCA PKI Secrets Engine for HashiCorp Vault, see [Getting Started](docs/getting-started.md).
## Community Support
In the [Keyfactor Community](https://www.keyfactor.com/community/), we welcome contributions. Keyfactor Community software is open-source and community-supported, meaning that **no SLA** is applicable. Keyfactor will address issues as resources become available.
* To report a problem or suggest a new feature, go to [Issues](../../issues).
* If you want to contribute bug fixes or proposed enhancements, see the [Contributing Guidelines](CONTRIBUTING.md) and create a [Pull request](../../pulls).## Commercial Support
Commercial support is available for [EJBCA Enterprise](https://www.keyfactor.com/products/ejbca-enterprise/).
## License
For license information, see [LICENSE](LICENSE).## Related Projects
See all [Keyfactor EJBCA GitHub projects](https://github.com/orgs/Keyfactor/repositories?q=ejbca).