HashiCorp Vault Sub-CA
1. Overview
HashiCorp Vault serves as the enterprise PKI for Domus Digitalis, replacing the deprecated AD CS on home-dc01.inside.domusdigitalis.dev. The Vault PKI provides automated certificate issuance for:
-
Linux workstation EAP-TLS authentication (802.1X)
-
Server certificates for internal services
-
BYOD device certificates (90-day TTL)
-
pxGrid integration certificates
-
Short-lived automation certificates
|
AD CS (HOME-ROOT-CA) on home-dc01.inside.domusdigitalis.dev is deprecated and will be decommissioned by 2026-07. All new certificates must be issued from Vault PKI. |
2. Architecture
2.1. Two-Tier PKI Hierarchy
| Authority | Role | Validity | Location |
|---|---|---|---|
DOMUS-ROOT-CA |
Root CA (offline after ceremony) |
20 years (2026-2046) |
certmgr-01.inside.domusdigitalis.dev:8200 |
DOMUS-ISSUING-CA |
Issuing CA (online) |
5 years (2026-2031) |
certmgr-01.inside.domusdigitalis.dev:8200 |
2.2. Certificate Roles
| Role | TTL | Use Case |
|---|---|---|
|
1 year |
Server certificates (ISE, Keycloak, NAS) |
|
1 year |
Linux workstation EAP-TLS |
|
90 days |
BYOD mobile device certificates |
|
1 year |
pxGrid client authentication |
|
24-72h |
Ephemeral automation certificates |
3. Current Status
| Component | Status | Notes |
|---|---|---|
Vault Server |
Active on certmgr-01.inside.domusdigitalis.dev |
Unsealed, healthy |
Root CA |
Established 2026-01-25 |
20-year validity |
Issuing CA |
Signed 2026-01-25 |
5-year validity |
Server role |
Configured |
Issuing certificates |
Workstation role |
Pending |
For Linux EAP-TLS |
BYOD role |
Pending |
For mobile devices |
AD CS Migration |
In progress |
Target: 2026-07 |
4. Quick Reference
4.1. Check Vault Status
# Load credentials
dsource d000 dev/vault
# Check status via netapi
netapi vault status
# Unseal if sealed
netapi vault unseal --auto
5. AD CS Migration Checklist
Migration from HOME-ROOT-CA to DOMUS-ROOT-CA:
-
Vault PKI established (2026-01-25)
-
Root CA created (20-year validity)
-
Issuing CA signed (5-year validity)
-
Server role configured
-
Workstation role configured (Linux EAP-TLS)
-
BYOD role configured (mobile devices)
-
ISE trust store updated (add Vault CAs)
-
Re-issue active certificates from Vault
-
Remove CA role from home-dc01.inside.domusdigitalis.dev
6. Related Documentation
6.1. Runbooks
-
DOMUS PKI Key Ceremony - Root CA establishment record
-
Vault PKI Verification - Daily verification procedures
-
Enterprise PKI Strategy - Architecture and procedures
6.2. Related Projects
-
netapi CLI - Network automation CLI (includes
netapi vaultcommands) -
domus-secrets-ops - dsec/SOPS credential handling for Vault tokens
-
domus-ise-linux - Linux 802.1X certificate enrollment
6.3. Infrastructure
-
Infrastructure Diagrams - PKI hierarchy diagram
-
Infrastructure Inventory - All systems including certmgr-01