Skip to Main Content
IBM System Storage Ideas Portal


This portal is to open public enhancement requests against IBM System Storage products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).


Shape the future of IBM!

We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:

Search existing ideas

Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,

Post your ideas
  1. Post an idea.

  2. Get feedback from the IBM team and other customers to refine your idea.

  3. Follow the idea through the IBM Ideas process.


Specific links you will want to bookmark for future use

Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.

IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.

ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.

Status Under review
Workspace Storage Fusion
Created by Guest
Created on Sep 23, 2024

Security mandates for Storage Fusion credentials and MCG integration to S3

ITAU Bank is one of the largest private banks in Brazil. Customer is very advanced in Cloud Adoption, having AWS as their main partner and managing over 9K AWS accounts.

While providing agility and independence, their methodology also increases in complexity and potential security risks. Customer employs strict security practices (mandates and guardrails) for managing and delivering credentials, utilizing Hashicorp Vault as a external vault, to minimize exposure and ensuring the credentials rotation.

So in this sense, customer need the Storage Fusion being able to integrate with external vaults to manage its credentials. Also, for the MultiCloud Gateway S3 integration, customer does not want to use the HMAC Access Key and Secret Keys or manage it. An alternative to vault integration is the use of IAM roles, which is more restrictive and least privilege possible for accessing those S3 Buckets.

Following the task flow customer expect as the integration between Fusion and the external vault (Hashicorp)

Authentication

curl \
--cacert CA-cert.pem \
--cert arquivoDeCertificado.crt \
--key arquivoDeChavePrivada.key \
--request POST \
https://vault.itau:8200/v1/auth/cert/login

The most important parms from the command above are: client_token and lease_duration:

{
...
"auth": {
"client_token": "cf95f87d-f95b-47ff-b1f5-ba7bff850425",
...
"lease_duration": 3600,
...
}
...
}

Recover the credentails from vault

Using the client_token, you can recover the secret, which will generate the AWS credentials:

curl \
--cacert CA-cert.pem \
--header "X-Vault-Token: cf95f87d-f95b...." \
--request GET \
https://vault.itau:8200/v1/aws/creds/role-fornecida-pela-squadGSCE

Results

{
"data": {
"access_key": "AKIA...",
"secret_key": "xlCs...",
"security_token": "243Hdbs...",
"arn": "arn:aws:sts::123456789012:assumed-role/DeveloperRole/some-user-supplied-role-session-name",
"ttl": 3600
}
}


Export the environment variables

export AWS_ACCESS_KEY_ID= AKIAIOSFODNN7EXAMPLE
export AWS_SECRET_ACCESS_KEY=wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY
export AWS_DEFAULT_REGION=região
export AWS_SESSION_TOKEN=IQoJb3JpZ2luX2VjEMP//////////wEaCXNhLWVhc3QtMSJIMEYCIQDM

Customer will not go into production without this feature implemented or in a clear roadmap.

Idea priority Medium