CLI Reference - Gateway
This section outlines the CLI commands relevant to the Gateway.
General Flags
--profile, --token: Use a specific profile (located at $HOME/.akeyless/profiles) or a temporary access token
--uid-token: The universal identity token, required only for universal_identity authentication
-h, --help: Display help information
--json[=false]: Set the output format to JSON
--jq-expression: Provide a jQuery expression to filter result output
--no-creds-cleanup[=false]: Do not clean local temporary expired credentials
Access Permissions
Commands for managing the access of users to your Gateway.
add-gw-access-id
add-gw-access-idGrants Gateway access to users
Usage
akeyless add-gw-access-id \
--cluster-name <Cluster Name> \
--access-id <AccessID> \
--sub-claims <group=admins>Flags
-c, --cluster-name: Required, The name of the updated cluster
-a, --access-id: Required, The Access ID to be able to access the gateway
-s, --sub-claims: key/val of sub-claims, e.g group=admins,developers
delete-gw-access-id
delete-gw-access-idDenials Gateway access to users
Usage
akeyless delete-gw-access-id \
--cluster-name <Cluster Name> \
--access-id <Access ID>Flags
-c, --cluster-name: Required, The name of the updated cluster
-a, --access-id: Required, The Access ID to be able to access the gateway
gateway-create-allowed-access
gateway-create-allowed-accessAdd users that will have permission to manage the Gateway
Usage
akeyless gateway-create-allowed-access \
--name <Allowed Access Name> \
--access-id <Access-ID> \
--gateway-url 'https://<Your-Akeyless-GW-URL:8000>' \
--description <Allowed Access description> \
--sub-claims <key/val of sub claims> \
--permissions <permissions for this allowed access> Flags
-n, --name: Required, Allowed access name
--access-id: Required, The Access ID to be attached to this allowed access
--description: Allowed access description
-s, --sub-claims: key/val of sub-claims, e.g group=admins,developers
-p, --permissions: Comma-separated list of permissions for this allowed access. Available permissions: [defaults,targets,classic_keys,automatic_migration,ldap_auth,dynamic_secret,k8s_auth,log_forwarding,zero_knowledge_encryption,rotated_secret,caching,event_forwarding,admin,kmip,general, rotate_secret_value]
-c, --case-sensitive[=true]: Treat sub-claims as case-sensitive
-u, --gateway-url[=http://localhost:8000]: API Gateway URL (Configuration Management port)
gateway-update-allowed-access
gateway-update-allowed-accessSet users that will have permission to manage the Gateway
Usage
akeyless gateway-update-allowed-access \
--name <Allowed Access Name> \
--access-id <Access-ID> \
--new-name <New allowed access name> \
--gateway-url <API Gateway URL:8000> \
--description <Allowed Access description> \
--sub-claims <key/val of sub claims> \
--permissions <permissions for this allowed access> Flags
-n, --name: Required, Allowed access name
--access-id: Required, The Access ID to be attached to this allowed access
--new-name: New allowed access name
--description: Allowed access description
-s, --sub-claims: key/val of sub claims, e.g group=admins,developers
-p, --permissions: Comma-seperated list of permissions for this allowed access. Available permissions: [defaults,targets,classic_keys,automatic_migration,ldap_auth,dynamic_secret,k8s_auth,log_forwarding,zero_knowledge_encryption,rotated_secret,caching,event_forwarding,admin,kmip,general]
-c, --case-sensitive[=true]: Treat sub claims as case-sensitive
-u, --gateway-url[=http://localhost:8000]: API Gateway URL (Configuration Management port)
Gateway Configuration
delete-gateway-cluster
delete-gateway-clusterDeletes a gateway in the account
Usage
akeyless delete-gateway-cluster \
--cluster-name <Cluster Name> \
--force < true / flase>Flags
-c, --cluster-name: Required, Gateway Cluster, e.g. acc-abcd12345678/p-123456789012/defaultCluster
--force: Deletes cluster even if there is an active gateway or associated secrets. All Gateway secrets will be deleted
gateway-get-config
gateway-get-configGets gateway configuration details
Usage
akeyless gateway-get-config \
--gateway-url 'https://<Your-Akeyless-GW-URL:8000>'gateway-update-tls-cert
gateway-update-tls-certUpdates TLS certificate in the Gateway
akeyless gateway-update-tls-cert \
--cert-data <TLS Certificate> \
--cert-file-name <Path/To/Certificate> \
--key-data <TLS Private Key> \
--key-file-name <Path/To/Key> \
--gateway-url 'https://<Your-Akeyless-GW-URL:8000>'Flags
--cert-data: TLS Certificate (base64 encoded), this flag is ignored if --cert-file-name is supplied
--cert-file-name: Path to the file containing the TLS Certificate, this flag is ignored if --cert-data is supplied
--key-data: TLS Private Key (base64 encoded), this flag is ignored if --key-file-name is supplied
--key-file-name: Path to the file containing the TLS Private Key, this flag is ignored if --key-data is supplied
-u, --gateway-url[=http://localhost:8000]: API Gateway URL (Configuration Management port)
gateway get
gateway getCommand to get specified gateway configuration
gateway get cache
gateway get cacheGet cache settings
Usage
akeyless gateway get cache \
--gateway-url 'https://<Your-Akeyless-GW-URL:8000>'gateway get defaults
gateway get defaultsGet defaults settings
Usage
akeyless gateway get defaults \
--gateway-url 'https://<Your-Akeyless-GW-URL:8000>'gateway list
gateway listgateway list customer-fragments
gateway list customer-fragmentsCommand to list the Customer Fragments on the Gateway
Usage
akeyless gateway list customer-fragments \
--gateway-url 'https://<Your-Akeyless-GW-URL:8000>'gateway update
gateway updateCommand to update specified gateway configuration
gateway update cache
gateway update cacheUpdates cache settings
Usage
akeyless gateway update cache \
--enable-cache [true/false] \
--stale-timeout[=60] <Stale timeout in minutes> \
--enable-proactive [true/false] \
--gateway-url 'https://<Your-Akeyless-GW-URL:8000>'Flags
--enable-cache: Enable cache [true/false]
--stale-timeout[=60]: Stale timeout in minutes, cache entries which are not accessed within timeout will be removed from cache
--enable-proactive: Enable proactive caching [true/false]
--minimum-fetch-interval[=5]: When using Cache or/and Proactive Cache, additional secrets will be fetched upon requesting a secret, based on the requestor's access policy. Define minimum fetching interval to avoid over fetching in a given time frame
--backup-interval[=1]: Secure backup interval in minutes. To ensure service continuity in case of power cycle and network outage secrets will be backed up periodically per backup interval
-u, --gateway-url: Gateway URL (Configuration Management port)
gateway update defaults
gateway update defaultsUpdates defaults settings
Usage
akeyless gateway update defaults \
--saml-access-id[=use-existing] <saml-AccessID> \
--oidc-access-id[=use-existing] <oidc-AccessID> \
--cert-access-id[=use-existing] <cert-AccessID> \
--key[=Default] <gw encryption key> \
--event-on-status-change [true/false]
--gateway-url 'https://<Your-Akeyless-GW-URL:8000>'Flags
--saml-access-id[=use-existing]: Default SAML access-id for UI login
--oidc-access-id[=use-existing]: Default OIDC access-id for UI login
--cert-access-id[=use-existing]: Default Certificate access-id for UI login
--key[=Default]: The name of the gateway default encryption key
--hvp-route-version: Hvp route version to use [1/2]
--event-on-status-change: Trigger an event when Gateway status is changed [true/false]
-u, --gateway-url[=http://localhost:8000]: Gateway URL (Configuration Management port)
Updated 7 days ago
