Role up your identity
As part of enabling production for a service, we need to work with who is going to access the system, and what they can do. This is typically referred to as Role-Based Access Control, or RBAC. We also want to be able to maintain an audit trail for the system. This last part is becoming increasingly important as we get out of that trusted walled garden network and into the cloud. I can't tell you how many times, even in a controlled environment, I had to go back and figure out what changed and when that broke my system! In the interests of full disclosure, an Enterprise-level license for Consul is required to implement this level of functionality.
The actual process of logging in to the Consul system can certainly be managed by using ACLs and then treating any human like a machine by giving them their own particular access token. However, these tokens aren't as simple as Jean Valjean's 24601. So, inevitably, somebody will end up writing their...