This is an example of how to control access to Vault resources in a multi-team organisation.
Of course, the usage processes will vary from company to company and user to user.
As Cryptvault.cloud is very flexible in its use, it should be possible for any organisational structure to integrate the product.
In this scenario, we show the most commonly used pattern:
It is a specialised company
There is a team that is the root administrator of CryptVault.
They structure the data inside the CryptVault.
When a team needs access to data in the Cryptvault, they request it from the administration team.
The safest and easiest way to submit this request to the Administration Team is as follows:
This example shows how you can connect and authorise teams without sharing the private key, and still allow the team to create additional identities with restricted access.
This is often done via a git repo using a merge request. This is where teams enter their required permission configurations, which then need to be approved by an admin user.
It may then be worth using the Terraform provider in combination with a CI pipeline.