feat(auth ldap): enhance root credential rotation with schema and credential type to support AD and RACF #31626
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
Enable root password rotation for Active Directory and RACF rotation schemas.
Adds support for AD and RACF rotation schemas so the backend can rotate the root credential for those directory types (same behavior as in hashicorp/vault-plugin-secrets-openldap ).
Includes unit tests that exercise the generated LDAP Modify requests for OpenLDAP, AD, and RACF, and validates rotate-root config options.
Notes:
Rather than importing the openldap plugin, a minimal, self-contained implementation was added in this repository to avoid pulling plugin code into the main Vault tree.
It would be cleaner to consolidate this logic under
github.com/hashicorp/vault/sdk/helper/ldaputilso both repositories share the same implementation. Kept the smaller in-repo version here to preserve backward compatibility and limit scope of change — happy to refactor to ldaputil if preferred.Testing:
Test coverage includes config validation, modify-request generation.
TODO only if you're a HashiCorp employee
backport/label that matches the desired release branch.PCI review checklist
Examples of changes to security controls include using new access control methods, adding or removing logging pipelines, etc.