Apono Vault
Deploy an Apono native vault in your Kubernetes environment to store privileged accounts and manage access through Apono
Many organizations enforce strict policies that prohibit storing highly privileged credentials in third-party SaaS platforms. Security teams still need a way to securely store credentials such as cloud root accounts, database sysadmins, and emergency breakglass credentials while ensuring access is tightly controlled.
Apono Vault solves this problem by allowing you to deploy a lightweight vault inside your own Kubernetes environment. This vault stores secrets locally while Apono manages just-in-time (JIT) access, approvals, and auditing.
Through this integration, your organization can:
Store sensitive credentials entirely inside your own infrastructure
Eliminate hard-coded secrets and credentials sprawl
Grant engineers temporary, policy-controlled access to secrets
Maintain Zero Standing Privileges (ZSP) through time-bound access
Audit who accessed privileged credentials and when
Apono Vault is built on OpenBao and deployed directly in your Kubernetes cluster.
Prerequisites
Apono Connector
On-prem connection serving as a bridge between Kubernetes and Apono Learn how to install or update a connector for Kubernetes. NOTE: The connector must have permissions to access the Kubernetes namespace where the vault is deployed and read the vault credentials secret.
Apono CLI
Command-line tool enabling you to view, request, and receive permission to resources that are centrally managed by Apono Version 1.3.5 or later is required for vault operations. Learn how to install and manage the Apono CLI.
Kubernetes Cluster
Kubernetes 1.30 or later with a configured PersistentVolume provisioner
Learn how to create a cluster.
Helm
Helm 3.12 or later installed in your environment Learn how to install Helm.
kubectl
kubectl configured to access your Kubernetes cluster
Learn how to organize cluster access with the kubectl command-line tool.
Deploy Apono Vault
Deploy Apono Vault in your Kubernetes cluster using one of the following methods.
We recommend this deployment option.
Follow this step to deploy Apono Vault in your cluster:
Run the installation script to automatically add the Helm repository, deploy the vault, and output the configuration details required for the Apono integration.
Optional parameters
You can append parameters to the install script to add specific conditions to the vault deployment.
Deploy to a custom namespace:
Deploy to a specific Kubernetes context:
Deploy with custom Helm parameters:
Use a custom values file:
Follow this step to deploy Apono Vault in your cluster:
Deploy the vault using Helm.
The --wait flag blocks the vault until all resources, including the initialization job, are ready. To monitor initialization in real time, omit --wait and tail the logs:
Optional parameters
You can add parameters in Helm to add specific conditions to the vault deployment.
Deploy to a custom namespace:
Configurable parameters
You can customize your deployment by passing the following Helm values with the --set flag.
vault.server.image.tag
Vault image version
2.5.1
vault.server.resources.requests.memory
Memory request
128Mi
vault.server.resources.requests.cpu
CPU request
100m
vault.server.resources.limits.memory
Memory limit
256Mi
vault.server.resources.limits.cpu
CPU limit
250m
vault.server.dataStorage.size
PVC size for Raft data
1Gi
vault.server.dataStorage.storageClass
Storage class (uses cluster default if unset)
null
vault.server.service.type
Kubernetes service type
ClusterIP
vault.server.service.port
Service port
8200
Example:
Record installation output
After installation is complete, the output displays the connector configuration values you need to integrate Apono Vault. Record the values below.
Internal URL
Cluster-internal URL for the vault
http://apono-vault.apono-vault.svc.cluster.local:8200
External URL
Optional externally accessible vault endpoint
—
Namespace
Kubernetes namespace where the vault was deployed
apono-vault
Secret Name
Kubernetes secret containing the AppRole credentials
apono-vault-role
Integrate Apono Vault
You can also use the steps below to integrate with Apono using Terraform.
In step 11, instead of clicking Confirm, follow the Are you integrating with Apono using Terraform? guidance.
Follow these steps to complete the integration:
On the Catalog tab, click Apono Vault. The Connect Integration page appears.
Under Discovery, select one or both of the Apono Vault resource types (Secret and Management).
Users granted access to a resource type will be able to perform different actions depending on their permission level. Granted permissions apply only to the secrets requested by the user.
Click Next. The Apono connector section expands.
From the dropdown menu, select a connector. Choosing a connector links Apono to all the services available on the account where the connector is located.
If the desired connector is not listed, click + Add new connector and follow the instructions to install the connector.
Click Next. The Integration Config section expands.
Define the Integration Config settings.
SettingDescriptionIntegration Name
Unique, alphanumeric, user-friendly name used to identify this integration when constructing an access flow
Vault Internal URL
Cluster-internal vault endpoint Copy this value from the installation output.
Vault External URL
Optional external endpoint if the vault service is exposed outside the cluster Copy this value from the installation output.
Click Next. The Secret Store section expands.
Enter your Kubernetes secret in the Secret Store.
Namespace
Kubernetes namespace where the vault is deployed
Copy this value from the installation output.
Name
Kubernetes secret containing the AppRole credentials
Copy this value from the installation output.
Click Next. The Get more with Apono section expands.
Define the Get more with Apono settings.
SettingDescriptionCustom Access Details
(Optional) Instructions explaining how to access this integration's resources Upon accessing an integration, a message with these instructions will be displayed to end users in the User Portal. The message may include up to 400 characters. To view the message as it appears to end users, click Preview.
Integration Owner
(Optional) Fallback approver if no resource owner is found Follow these steps to define one or several integration owners:
From the Attribute dropdown menu, select User or Group under the relevant identity provider (IdP) platform.
From the Value dropdown menu, select one or multiple users or groups.
NOTE: When Resource Owner is defined, an Integration Owner must be defined.
Resource Owner
(Optional) Group or role responsible for managing access approvals or rejections for the resource Follow these steps to define one or several resource owners:
Enter a Key name. This value is the name of the tag created in your cloud environment.
From the Attribute dropdown menu, select an attribute under the IdP platform to which the key name is associated. Apono will use the value associated with the key (tag) to identify the resource owner. When you update the membership of the group or role in your IdP platform, this change is also reflected in Apono.
NOTE: When this setting is defined, an Integration Owner must also be defined.
Click Confirm.
💡Are you integrating with Apono using Terraform?
If you want to integrate with Apono using Terraform, follow these steps instead of clicking Confirm:
At the top of the screen, click View as Code. A modal appears with the completed Terraform configuration code.
Click to copy the code.
Make any additional edits.
Deploy the code in your Terraform.
Refer to Integration Config Metadata for more details about the schema definition.
Now that you have completed this integration, you can create access flows that grant permission to your Apono Vault secrets. Users who are granted access can manage secrets using the Apono CLI.
Manage secrets in Apono Vault
Users can perform different actions in Apono Vault depending on the resource types and permissions they have been granted through an access flow.
Users granted access to the Management resource type can manage secrets within the vault. However, their available actions depend on their granted permissions.
Admin
✅
✅
✅
✅
✅
ReadWrite
✅
✅
✅
✅
❌
ReadOnly
✅
❌
✅
❌
❌
List secrets:
Create a secret:
Fetch a secret:
Update a secret:
Delete a secret:
Users granted the Secret resource type receive ReadOnly permissions and can fetch specific secrets.
Troubleshooting Apono Vault
Expand the sections below to troubleshoot common issues. Contact Apono Support if you require additional help.
Vault does not auto-unseal after restart
Run the following command to verify the unseal secret contains real values.
If the value is placeholder, the initialization job has failed. Re-run the initialization.
Raft lock file error
If a vault pod is force-deleted, a stale Raft lock file may remain.
Run the following command to reinstall the vault.
Then, reinstall the vault using one of the deployment methods above.
Deleting the PVC permanently removes all vault data.
Uninstall Apono Vault
Deleting the PVC permanently removes all vault data.
Follow these steps to uninstall Apono Vault:
Run the following command to uninstall the vault deployment.
(Optional) Run the following command to fully clean the environment.
Last updated
Was this helpful?
