Skip to content

[User Story] Configure Tailscale to use one-time auth keys #74

@noahwhite

Description

@noahwhite

Story Summary

As an infrastructure operator, I want Tailscale provisioning to use one-time auth keys, so that auth keys exposed in OpenTofu state cannot be reused by unauthorized parties.


✅ Acceptance Criteria

  • Document the one-time key generation process in a runbook
  • Update Bitwarden secret management to note that a new one-time key must be generated before reprovisioning
  • Verify key is invalidated in Tailscale admin console after first use
  • Update token rotation runbook with Tailscale auth key rotation procedure

📝 Additional Context


📦 Definition of Ready

  • Acceptance criteria defined
  • No unresolved external dependencies
  • Story is estimated
  • Team has necessary skills and access
  • Priority is clear
  • Business value understood

✅ Definition of Done

  • All acceptance criteria met
  • Peer-reviewed
  • Docs updated
  • No critical bugs/regressions

Metadata

Metadata

Assignees

No one assigned

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions