mirror of
https://github.com/hashicorp/vault.git
synced 2025-12-16 06:51:23 +01:00
Make enterprise callouts consistent (#22073)
This commit is contained in:
parent
769fe0b67d
commit
b6d973a133
@ -1611,7 +1611,9 @@ source is more consistent with expectations of external apps, but see
|
|||||||
the [PKI Considerations](/vault/docs/secrets/pki/considerations) page
|
the [PKI Considerations](/vault/docs/secrets/pki/considerations) page
|
||||||
for a discussion on cluster size and unified CRLs/OCSP.
|
for a discussion on cluster size and unified CRLs/OCSP.
|
||||||
|
|
||||||
~> Note: Unified CRLs are a Vault Enterprise only feature.
|
<EnterpriseAlert product="vault">
|
||||||
|
Unified CRLs require a Vault Enterprise license or HCP Plus cluster.
|
||||||
|
</EnterpriseAlert>
|
||||||
|
|
||||||
These are unauthenticated endpoints.
|
These are unauthenticated endpoints.
|
||||||
|
|
||||||
@ -1691,7 +1693,9 @@ source is more consistent with expectations of external apps, but see
|
|||||||
the [PKI Considerations](/vault/docs/secrets/pki/considerations) page
|
the [PKI Considerations](/vault/docs/secrets/pki/considerations) page
|
||||||
for a discussion on cluster size and unified CRLs/OCSP.
|
for a discussion on cluster size and unified CRLs/OCSP.
|
||||||
|
|
||||||
~> Note: Unified OCSP is a Vault Enterprise only feature.
|
<EnterpriseAlert product="vault">
|
||||||
|
Unified OCSP requires a Vault Enterprise license or HCP Plus cluster.
|
||||||
|
</EnterpriseAlert>
|
||||||
|
|
||||||
At this time there are certain limitations of the OCSP implementation at this path:
|
At this time there are certain limitations of the OCSP implementation at this path:
|
||||||
|
|
||||||
@ -3820,7 +3824,8 @@ the CRL.
|
|||||||
revocations on, to regenerate the delta CRL. Must be shorter than CRL
|
revocations on, to regenerate the delta CRL. Must be shorter than CRL
|
||||||
expiry.
|
expiry.
|
||||||
|
|
||||||
- `cross_cluster_revocation` `(bool: false)` - Enables cross-cluster revocation
|
- `cross_cluster_revocation` `(bool: false)` -
|
||||||
|
<EnterpriseAlert product="vault" inline /> Enables cross-cluster revocation
|
||||||
request queues. When a serial not issued on this local cluster is presented
|
request queues. When a serial not issued on this local cluster is presented
|
||||||
to Vault via the [`/revoke` API](#revoke-certificate), it is replicated
|
to Vault via the [`/revoke` API](#revoke-certificate), it is replicated
|
||||||
across clusters and the cluster which issued that certificate will revoke
|
across clusters and the cluster which issued that certificate will revoke
|
||||||
@ -3831,11 +3836,10 @@ the CRL.
|
|||||||
cross-cluster revocation request will be created.<br /><br />
|
cross-cluster revocation request will be created.<br /><br />
|
||||||
API calls to revoke a certificate with Proof of Possession (PoP) cannot
|
API calls to revoke a certificate with Proof of Possession (PoP) cannot
|
||||||
be satisfied if the certificate is not available locally and will
|
be satisfied if the certificate is not available locally and will
|
||||||
not result in a cross-cluster revocation request.
|
not result in a cross-cluster revocation request.
|
||||||
|
|
||||||
~> Note: `cross_cluster_revocation` is a Vault Enterprise only feature.
|
- `unified_crl` `(bool: false)` -
|
||||||
|
<EnterpriseAlert product="vault" inline /> Enables unified CRL and OCSP building. This
|
||||||
- `unified_crl` `(bool: false)` - Enables unified CRL and OCSP building. This
|
|
||||||
synchronizes all revocations between clusters; a single, unified CRL will be
|
synchronizes all revocations between clusters; a single, unified CRL will be
|
||||||
built on the active node of the primary performance replication (PR)
|
built on the active node of the primary performance replication (PR)
|
||||||
cluster. Any node in any PR cluster will be able to serve this unified CRL
|
cluster. Any node in any PR cluster will be able to serve this unified CRL
|
||||||
@ -3846,17 +3850,14 @@ the CRL.
|
|||||||
cluster, but revoked via BYOC on another, this option will inform the
|
cluster, but revoked via BYOC on another, this option will inform the
|
||||||
issuing cluster of the revocation.
|
issuing cluster of the revocation.
|
||||||
|
|
||||||
~> Note: `unified_crl` is a Vault Enterprise only feature.
|
- `unified_crl_on_existing_paths` `(bool: false)` -
|
||||||
|
<EnterpriseAlert product="vault" inline /> Enables serving the
|
||||||
- `unified_crl_on_existing_paths` `(bool: false)` - Enables serving the
|
|
||||||
unified CRL and OCSP on the existing, previously cluster-local paths
|
unified CRL and OCSP on the existing, previously cluster-local paths
|
||||||
(e.g., `/pki/crl` will now contain the unified CRL when enabled). This
|
(e.g., `/pki/crl` will now contain the unified CRL when enabled). This
|
||||||
allows transitioning AIA-based consumption of CRLs to a unified view
|
allows transitioning AIA-based consumption of CRLs to a unified view
|
||||||
without having to re-issue certificates or update scripts pulling
|
without having to re-issue certificates or update scripts pulling
|
||||||
a single CRL.
|
a single CRL.
|
||||||
|
|
||||||
~> Note: `unified_crl_on_existing_paths` is a Vault Enterprise only feature.
|
|
||||||
|
|
||||||
#### Sample payload
|
#### Sample payload
|
||||||
|
|
||||||
```json
|
```json
|
||||||
|
|||||||
@ -6,7 +6,7 @@ description: The '/sys/config/control-group' endpoint configures control groups.
|
|||||||
|
|
||||||
# `/sys/config/control-group`
|
# `/sys/config/control-group`
|
||||||
|
|
||||||
~> **Enterprise Only** – These endpoints require Vault Enterprise.
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
|
|
||||||
The `/sys/config/control-group` endpoint is used to configure Control Group
|
The `/sys/config/control-group` endpoint is used to configure Control Group
|
||||||
settings.
|
settings.
|
||||||
|
|||||||
@ -6,7 +6,7 @@ description: The '/sys/config/group-policy-application' endpoint is used to conf
|
|||||||
|
|
||||||
# `/sys/config/group-policy-application`
|
# `/sys/config/group-policy-application`
|
||||||
|
|
||||||
~> **Enterprise Only** – These endpoints require Vault Enterprise Platform.
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
|
|
||||||
The `sys/config/group-policy-application` endpoint can be used to configure the
|
The `sys/config/group-policy-application` endpoint can be used to configure the
|
||||||
mode of policy application for identity groups in Vault. This setting dictates
|
mode of policy application for identity groups in Vault. This setting dictates
|
||||||
|
|||||||
@ -17,9 +17,7 @@ Currently, it only supports reloading license information from files on disk.
|
|||||||
|
|
||||||
- `subsystem` `(string: <required>)` - Specifies the subsystem for Vault to reload. This is part of the request URL.
|
- `subsystem` `(string: <required>)` - Specifies the subsystem for Vault to reload. This is part of the request URL.
|
||||||
|
|
||||||
## Reload license file
|
## Reload license file <EnterpriseAlert product="vault" inline />
|
||||||
|
|
||||||
~> **Enterprise Only** – This endpoint requires Vault Enterprise.
|
|
||||||
|
|
||||||
When the `:subsystem` URL parameter is specified as `license`, Vault re-reads
|
When the `:subsystem` URL parameter is specified as `license`, Vault re-reads
|
||||||
the license file if the license was provided using the `license_path` configuration
|
the license file if the license was provided using the `license_path` configuration
|
||||||
|
|||||||
@ -6,7 +6,7 @@ description: The '/sys/control-group' endpoint handles the Control Group workflo
|
|||||||
|
|
||||||
## Authorize control group request
|
## Authorize control group request
|
||||||
|
|
||||||
~> **Enterprise Only** – These endpoints require Vault Enterprise.
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
|
|
||||||
This endpoint authorizes a control group request.
|
This endpoint authorizes a control group request.
|
||||||
|
|
||||||
|
|||||||
@ -6,7 +6,7 @@ description: The `/sys/quotas/lease-count` endpoint is used to create, edit and
|
|||||||
|
|
||||||
# `/sys/quotas/lease-count`
|
# `/sys/quotas/lease-count`
|
||||||
|
|
||||||
~> **Enterprise Only** – These endpoints require Vault Enterprise Platform.
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
|
|
||||||
The `/sys/quotas/lease-count` endpoint is used to create, edit and delete lease count quotas.
|
The `/sys/quotas/lease-count` endpoint is used to create, edit and delete lease count quotas.
|
||||||
|
|
||||||
|
|||||||
@ -8,7 +8,7 @@ description: |-
|
|||||||
|
|
||||||
# `/sys/license/status`
|
# `/sys/license/status`
|
||||||
|
|
||||||
~> **Enterprise Only** – These endpoints require Vault Enterprise.
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
|
|
||||||
The `/sys/license/status` endpoint is used to view update the license used in
|
The `/sys/license/status` endpoint is used to view update the license used in
|
||||||
Vault.
|
Vault.
|
||||||
|
|||||||
@ -99,7 +99,9 @@ $ curl \
|
|||||||
|
|
||||||
#### PKCS#11 backend parameters
|
#### PKCS#11 backend parameters
|
||||||
|
|
||||||
~> NOTE: The `pkcs11` backend is only available with Vault Enterprise Plus (HSMs) edition
|
<Note>
|
||||||
|
The <code>pkcs11</code> backend is only available with Vault Enterprise plus HSMs
|
||||||
|
</Note>
|
||||||
|
|
||||||
- `type` `(string: "pkcs11")` - To select a PKCS#11 backend, the type parameter must be set to `pkcs11`.
|
- `type` `(string: "pkcs11")` - To select a PKCS#11 backend, the type parameter must be set to `pkcs11`.
|
||||||
|
|
||||||
|
|||||||
@ -10,7 +10,11 @@ description: >-
|
|||||||
|
|
||||||
The `/sys/policies` endpoints are used to manage ACL, RGP, and EGP policies in Vault.
|
The `/sys/policies` endpoints are used to manage ACL, RGP, and EGP policies in Vault.
|
||||||
|
|
||||||
~> **NOTE**: This endpoint is only available in Vault version 0.9+. Please also note that RGPs and EGPs are Vault Enterprise Premium features and the associated endpoints are not available in Vault Open Source or Vault Enterprise Pro.
|
<Note>
|
||||||
|
<code>/sys/policies</code> endpoints are only available in Vault version 0.9+.
|
||||||
|
RGPs and EGPs are Vault Enterprise upgrade features that are not available in
|
||||||
|
Vault Open Source or basic Vault Enterprise installations.
|
||||||
|
</Note>
|
||||||
|
|
||||||
## List ACL policies
|
## List ACL policies
|
||||||
|
|
||||||
|
|||||||
@ -8,7 +8,7 @@ description: >-
|
|||||||
|
|
||||||
# `/sys/replication`
|
# `/sys/replication`
|
||||||
|
|
||||||
~> **Enterprise Only** – These endpoints require Vault Enterprise.
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
|
|
||||||
## Attempt recovery
|
## Attempt recovery
|
||||||
|
|
||||||
|
|||||||
@ -8,7 +8,7 @@ description: >-
|
|||||||
|
|
||||||
# `/sys/replication/dr`
|
# `/sys/replication/dr`
|
||||||
|
|
||||||
~> **Enterprise Only** – These endpoints require Vault Enterprise.
|
@include 'alerts/enterprise-only.mdx'
|
||||||
|
|
||||||
## Check DR status
|
## Check DR status
|
||||||
|
|
||||||
|
|||||||
@ -8,7 +8,7 @@ description: >-
|
|||||||
|
|
||||||
# `/sys/replication/performance`
|
# `/sys/replication/performance`
|
||||||
|
|
||||||
~> **Enterprise Only** – These endpoints require Vault Enterprise.
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
|
|
||||||
## Check performance status
|
## Check performance status
|
||||||
|
|
||||||
|
|||||||
@ -8,7 +8,7 @@ description: >-
|
|||||||
|
|
||||||
# `/sys/sealwrap/rewrap`
|
# `/sys/sealwrap/rewrap`
|
||||||
|
|
||||||
~> **Enterprise Only** – These endpoints require Vault Enterprise.
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
|
|
||||||
The `/sys/sealwrap/rewrap` endpoint is used to rewrap all seal wrapped entries.
|
The `/sys/sealwrap/rewrap` endpoint is used to rewrap all seal wrapped entries.
|
||||||
This is useful when you want to upgrade seal wrapped entries to use the latest
|
This is useful when you want to upgrade seal wrapped entries to use the latest
|
||||||
|
|||||||
@ -16,7 +16,7 @@ snapshots with Vault's Raft storage backend.
|
|||||||
|
|
||||||
## Create/update an automated snapshots config
|
## Create/update an automated snapshots config
|
||||||
|
|
||||||
-> **Note**: This feature requires [Vault Enterprise](https://www.hashicorp.com/products/vault/)
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
|
|
||||||
**This endpoint requires sudo capability.**
|
**This endpoint requires sudo capability.**
|
||||||
|
|
||||||
|
|||||||
@ -9,7 +9,7 @@ description: |-
|
|||||||
|
|
||||||
# Automated integrated storage snapshots
|
# Automated integrated storage snapshots
|
||||||
|
|
||||||
-> **Note**: This feature requires [Vault Enterprise](https://www.hashicorp.com/products/vault/)
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
|
|
||||||
Any production system should include a provision for taking regular backups.
|
Any production system should include a provision for taking regular backups.
|
||||||
Vault Enterprise can be configured to take and store snapshots at a specific
|
Vault Enterprise can be configured to take and store snapshots at a specific
|
||||||
|
|||||||
@ -7,10 +7,10 @@ description: |-
|
|||||||
|
|
||||||
# Automated upgrades
|
# Automated upgrades
|
||||||
|
|
||||||
~> **Note**: Automated Upgrades requires [Vault Enterprise](https://www.hashicorp.com/products/vault/) to be
|
@include 'alerts/enterprise-only.mdx'
|
||||||
configured to use Integrated Storage.
|
|
||||||
|
|
||||||
Vault Enterprise Automated Upgrades allows operators to upgrade the Vault version currently running in a cluster automatically.
|
Operators running Vault Enterprise with integrated storage can use automated
|
||||||
|
upgrades to upgrade the Vault version currently running in a cluster automatically.
|
||||||
There are a few different ways to make this upgrade happen,
|
There are a few different ways to make this upgrade happen,
|
||||||
and control which versions are being upgraded to. With no additional configuration,
|
and control which versions are being upgraded to. With no additional configuration,
|
||||||
Vault will check the version of Vault that each node in the cluster is running. If a blue/green
|
Vault will check the version of Vault that each node in the cluster is running. If a blue/green
|
||||||
|
|||||||
@ -6,6 +6,8 @@ description: Vault Enterprise Consistency Model
|
|||||||
|
|
||||||
# Vault eventual consistency
|
# Vault eventual consistency
|
||||||
|
|
||||||
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
|
|
||||||
When running in a cluster, Vault has an eventual consistency model.
|
When running in a cluster, Vault has an eventual consistency model.
|
||||||
Only one node (the leader) can write to Vault's storage.
|
Only one node (the leader) can write to Vault's storage.
|
||||||
Users generally expect read-after-write consistency: in other
|
Users generally expect read-after-write consistency: in other
|
||||||
|
|||||||
@ -4,9 +4,9 @@ page_title: Vault Enterprise Control Groups
|
|||||||
description: Vault Enterprise has support for Control Group Authorization.
|
description: Vault Enterprise has support for Control Group Authorization.
|
||||||
---
|
---
|
||||||
|
|
||||||
# Vault enterprise control groups
|
# Vault Enterprise control groups
|
||||||
|
|
||||||
-> **Note**: This feature requires [Vault Enterprise Plus](https://www.hashicorp.com/products/vault/).
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
|
|
||||||
Vault Enterprise has support for Control Group Authorization. Control Groups
|
Vault Enterprise has support for Control Group Authorization. Control Groups
|
||||||
add additional authorization factors to be required before satisfying a request.
|
add additional authorization factors to be required before satisfying a request.
|
||||||
|
|||||||
@ -8,9 +8,12 @@ description: |-
|
|||||||
|
|
||||||
# Entropy augmentation
|
# Entropy augmentation
|
||||||
|
|
||||||
-> **Note**: This feature requires [Vault Enterprise Plus](https://www.hashicorp.com/products/vault/).
|
@include 'alerts/enterprise-only.mdx'
|
||||||
|
|
||||||
~> **Warning** This feature is not available with FIPS 140-2 Inside variants of Vault.
|
<Warning>
|
||||||
|
Entropy augmentation <b>is not</b> available with "FIPS 140-2 Inside" variants of
|
||||||
|
Vault.
|
||||||
|
</Warning>
|
||||||
|
|
||||||
Vault Enterprise features a mechanism to sample entropy (or randomness for
|
Vault Enterprise features a mechanism to sample entropy (or randomness for
|
||||||
cryptographic operations) from external cryptographic modules via the [seals](/vault/docs/configuration/seal)
|
cryptographic operations) from external cryptographic modules via the [seals](/vault/docs/configuration/seal)
|
||||||
|
|||||||
@ -8,7 +8,7 @@ description: |-
|
|||||||
|
|
||||||
# FIPS 140-2 inside
|
# FIPS 140-2 inside
|
||||||
|
|
||||||
-> **Note**: This feature requires [Vault Enterprise Plus](https://www.hashicorp.com/products/vault/).
|
@include 'alerts/enterprise-only.mdx'
|
||||||
|
|
||||||
Special builds of Vault Enterprise (marked with a `fips1402` feature name)
|
Special builds of Vault Enterprise (marked with a `fips1402` feature name)
|
||||||
include built-in support for FIPS 140-2 compliance. Unlike using Seal Wrap
|
include built-in support for FIPS 140-2 compliance. Unlike using Seal Wrap
|
||||||
|
|||||||
@ -6,6 +6,8 @@ description: An overview of FIPS compliance in Vault.
|
|||||||
|
|
||||||
# FIPS
|
# FIPS
|
||||||
|
|
||||||
|
@include 'alerts/enterprise-only.mdx'
|
||||||
|
|
||||||
The [Federal Information Processing Standard](https://www.nist.gov/federal-information-standards-fips)
|
The [Federal Information Processing Standard](https://www.nist.gov/federal-information-standards-fips)
|
||||||
is a cryptography-focused certification standard for U.S. Government usage.
|
is a cryptography-focused certification standard for U.S. Government usage.
|
||||||
|
|
||||||
|
|||||||
@ -9,7 +9,7 @@ description: |-
|
|||||||
|
|
||||||
# Seal wrap for FIPS compliance
|
# Seal wrap for FIPS compliance
|
||||||
|
|
||||||
-> **Note**: This feature requires [Vault Enterprise Plus](https://www.hashicorp.com/products/vault/).
|
@include 'alerts/enterprise-only.mdx'
|
||||||
|
|
||||||
Vault Enterprise features a mechanism to wrap values with an extra layer of
|
Vault Enterprise features a mechanism to wrap values with an extra layer of
|
||||||
encryption for supporting [seals](/vault/docs/configuration/seal). This adds an
|
encryption for supporting [seals](/vault/docs/configuration/seal). This adds an
|
||||||
|
|||||||
@ -8,6 +8,8 @@ description: >-
|
|||||||
|
|
||||||
# Vault enterprise HSM behavioral changes
|
# Vault enterprise HSM behavioral changes
|
||||||
|
|
||||||
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
|
|
||||||
This page contains information about the behavioral differences that take
|
This page contains information about the behavioral differences that take
|
||||||
effect when using Vault with an HSM.
|
effect when using Vault with an HSM.
|
||||||
|
|
||||||
|
|||||||
@ -8,7 +8,7 @@ description: >-
|
|||||||
|
|
||||||
# Vault enterprise HSM support
|
# Vault enterprise HSM support
|
||||||
|
|
||||||
-> **Note**: This feature requires [Vault Enterprise Plus](https://www.hashicorp.com/products/vault/).
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
|
|
||||||
- Root key Wrapping: Vault protects its root key by transiting it through
|
- Root key Wrapping: Vault protects its root key by transiting it through
|
||||||
the HSM for encryption rather than splitting into key shares
|
the HSM for encryption rather than splitting into key shares
|
||||||
|
|||||||
@ -6,6 +6,8 @@ description: Recommendations to ensure the security of a Vault Enterprise HSM de
|
|||||||
|
|
||||||
# Vault enterprise HSM security details
|
# Vault enterprise HSM security details
|
||||||
|
|
||||||
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
|
|
||||||
This page provides information to help ensure that a Vault HSM deployment is
|
This page provides information to help ensure that a Vault HSM deployment is
|
||||||
performed as securely as possible.
|
performed as securely as possible.
|
||||||
|
|
||||||
|
|||||||
@ -7,6 +7,8 @@ description: |-
|
|||||||
|
|
||||||
# Lease count quotas
|
# Lease count quotas
|
||||||
|
|
||||||
|
@include 'alerts/enterprise-only.mdx'
|
||||||
|
|
||||||
Vault features an extension to resource quotas that allows operators to enforce
|
Vault features an extension to resource quotas that allows operators to enforce
|
||||||
limits on how many leases are created. For a given lease count quota, if the
|
limits on how many leases are created. For a given lease count quota, if the
|
||||||
number of leases in the cluster hits the configured limit, `max_leases`, additional
|
number of leases in the cluster hits the configured limit, `max_leases`, additional
|
||||||
|
|||||||
@ -6,6 +6,8 @@ description: An overview of license autoloading.
|
|||||||
|
|
||||||
# License autoloading
|
# License autoloading
|
||||||
|
|
||||||
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
|
|
||||||
Prior to Vault 1.8, Vault Enterprise would be licensed using special binaries
|
Prior to Vault 1.8, Vault Enterprise would be licensed using special binaries
|
||||||
that contained embedded licenses, or via a license written into Vault storage
|
that contained embedded licenses, or via a license written into Vault storage
|
||||||
using the [POST sys/license API](/vault/api-docs/system/license#install-license).
|
using the [POST sys/license API](/vault/api-docs/system/license#install-license).
|
||||||
|
|||||||
@ -6,6 +6,8 @@ description: An overview of license.
|
|||||||
|
|
||||||
# Vault license
|
# Vault license
|
||||||
|
|
||||||
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
|
|
||||||
Licenses and EULA enhancements have been introduced in Vault 1.8 release. Please refer to the [FAQ](/vault/docs/enterprise/license/faq) for common questions concerning these changes.
|
Licenses and EULA enhancements have been introduced in Vault 1.8 release. Please refer to the [FAQ](/vault/docs/enterprise/license/faq) for common questions concerning these changes.
|
||||||
|
|
||||||
The [Install a HashiCorp Enterprise License](/vault/tutorials/enterprise/hashicorp-enterprise-license) tutorial provides the instruction to load your Vault license.
|
The [Install a HashiCorp Enterprise License](/vault/tutorials/enterprise/hashicorp-enterprise-license) tutorial provides the instruction to load your Vault license.
|
||||||
|
|||||||
@ -7,6 +7,8 @@ description: >-
|
|||||||
|
|
||||||
# Automated license utilization reporting
|
# Automated license utilization reporting
|
||||||
|
|
||||||
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
|
|
||||||
Automated license utilization reporting sends license utilization data to
|
Automated license utilization reporting sends license utilization data to
|
||||||
HashiCorp without requiring you to manually collect and report them. It also
|
HashiCorp without requiring you to manually collect and report them. It also
|
||||||
lets you review your license usage with the monitoring solution you already use
|
lets you review your license usage with the monitoring solution you already use
|
||||||
|
|||||||
@ -7,6 +7,7 @@ description: >-
|
|||||||
|
|
||||||
# Managed keys
|
# Managed keys
|
||||||
|
|
||||||
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
|
|
||||||
Within certain environments, customers want to leverage key management systems
|
Within certain environments, customers want to leverage key management systems
|
||||||
external to Vault, when handling, storing, and interacting with
|
external to Vault, when handling, storing, and interacting with
|
||||||
|
|||||||
@ -8,7 +8,7 @@ description: >-
|
|||||||
|
|
||||||
# Vault enterprise MFA support
|
# Vault enterprise MFA support
|
||||||
|
|
||||||
-> **Note**: This section highlights the Step-up Enterprise MFA feature and its capabilities specifically available for [Vault Enterprise](https://www.hashicorp.com/products/vault/) users.
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
|
|
||||||
Vault Enterprise has support for Multi-factor Authentication (MFA), using
|
Vault Enterprise has support for Multi-factor Authentication (MFA), using
|
||||||
different authentication types. MFA is built on top of the Identity system of
|
different authentication types. MFA is built on top of the Identity system of
|
||||||
|
|||||||
@ -6,6 +6,8 @@ description: Vault Enterprise supports Duo MFA type.
|
|||||||
|
|
||||||
# Duo MFA
|
# Duo MFA
|
||||||
|
|
||||||
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
|
|
||||||
This page demonstrates the Duo MFA on ACL'd paths of Vault.
|
This page demonstrates the Duo MFA on ACL'd paths of Vault.
|
||||||
|
|
||||||
## Configuration
|
## Configuration
|
||||||
|
|||||||
@ -6,6 +6,8 @@ description: Vault Enterprise supports Okta MFA type.
|
|||||||
|
|
||||||
# Okta MFA
|
# Okta MFA
|
||||||
|
|
||||||
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
|
|
||||||
This page demonstrates the Okta MFA on ACL'd paths of Vault.
|
This page demonstrates the Okta MFA on ACL'd paths of Vault.
|
||||||
|
|
||||||
## Configuration
|
## Configuration
|
||||||
|
|||||||
@ -6,6 +6,8 @@ description: Vault Enterprise supports PingID MFA type.
|
|||||||
|
|
||||||
# PingID MFA
|
# PingID MFA
|
||||||
|
|
||||||
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
|
|
||||||
This page demonstrates PingID MFA on ACL'd paths of Vault.
|
This page demonstrates PingID MFA on ACL'd paths of Vault.
|
||||||
|
|
||||||
## Configuration
|
## Configuration
|
||||||
|
|||||||
@ -6,6 +6,8 @@ description: Vault Enterprise supports TOTP MFA type.
|
|||||||
|
|
||||||
# TOTP MFA
|
# TOTP MFA
|
||||||
|
|
||||||
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
|
|
||||||
This page demonstrates the TOTP MFA on ACL'd paths of Vault.
|
This page demonstrates the TOTP MFA on ACL'd paths of Vault.
|
||||||
|
|
||||||
## Configuration
|
## Configuration
|
||||||
|
|||||||
@ -6,14 +6,7 @@ description: >-
|
|||||||
Multi-tenancy (SMT) and self-management.
|
Multi-tenancy (SMT) and self-management.
|
||||||
---
|
---
|
||||||
|
|
||||||
# Vault enterprise namespaces
|
# Vault Enterprise namespaces
|
||||||
|
|
||||||
<Note>
|
|
||||||
|
|
||||||
This feature is available in all versions of [Vault
|
|
||||||
Enterprise](https://www.hashicorp.com/products/vault/).
|
|
||||||
|
|
||||||
</Note>
|
|
||||||
|
|
||||||
Many organizations implement Vault as a "service", providing centralized
|
Many organizations implement Vault as a "service", providing centralized
|
||||||
management for teams within an organization while ensuring that those teams
|
management for teams within an organization while ensuring that those teams
|
||||||
|
|||||||
@ -6,7 +6,7 @@ description: Performance Standby Nodes - Vault Enterprise
|
|||||||
|
|
||||||
# Performance standby nodes
|
# Performance standby nodes
|
||||||
|
|
||||||
-> **Note**: This feature requires [Vault Enterprise Premium](https://www.hashicorp.com/products/vault/).
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
|
|
||||||
Vault supports a multi-server mode for high availability. This mode protects
|
Vault supports a multi-server mode for high availability. This mode protects
|
||||||
against outages by running multiple Vault servers. High availability mode
|
against outages by running multiple Vault servers. High availability mode
|
||||||
|
|||||||
@ -7,6 +7,8 @@ description: |-
|
|||||||
|
|
||||||
# Vault with AWS KMS external key store (XKS) via PKCS#11 and XKS proxy
|
# Vault with AWS KMS external key store (XKS) via PKCS#11 and XKS proxy
|
||||||
|
|
||||||
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
|
|
||||||
~> **Note**: AWS [`xks-proxy`](https://github.com/aws-samples/aws-kms-xks-proxy) is used in this document as a sample implementation.
|
~> **Note**: AWS [`xks-proxy`](https://github.com/aws-samples/aws-kms-xks-proxy) is used in this document as a sample implementation.
|
||||||
|
|
||||||
Vault's KMIP Secrets Engine can be used as an external key store for the AWS KMS [External Key Store (XKS)](https://aws.amazon.com/blogs/aws/announcing-aws-kms-external-key-store-xks/) protocol using the AWS [`xks-proxy`](https://github.com/aws-samples/aws-kms-xks-proxy) along
|
Vault's KMIP Secrets Engine can be used as an external key store for the AWS KMS [External Key Store (XKS)](https://aws.amazon.com/blogs/aws/announcing-aws-kms-external-key-store-xks/) protocol using the AWS [`xks-proxy`](https://github.com/aws-samples/aws-kms-xks-proxy) along
|
||||||
|
|||||||
@ -9,6 +9,8 @@ description: |-
|
|||||||
|
|
||||||
# PKCS#11 provider
|
# PKCS#11 provider
|
||||||
|
|
||||||
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
|
|
||||||
[PKCS#11](http://docs.oasis-open.org/pkcs11/pkcs11-base/v2.40/os/pkcs11-base-v2.40-os.html)
|
[PKCS#11](http://docs.oasis-open.org/pkcs11/pkcs11-base/v2.40/os/pkcs11-base-v2.40-os.html)
|
||||||
is an open standard C API that provides a means to access cryptographic capabilities on a device.
|
is an open standard C API that provides a means to access cryptographic capabilities on a device.
|
||||||
For example, it is often used to access a Hardware Security Module (HSM) (like a [Yubikey](https://www.yubico.com/)) from a local program (such as [GPG](https://gnupg.org/)).
|
For example, it is often used to access a Hardware Security Module (HSM) (like a [Yubikey](https://www.yubico.com/)) from a local program (such as [GPG](https://gnupg.org/)).
|
||||||
|
|||||||
@ -7,6 +7,8 @@ description: |-
|
|||||||
|
|
||||||
# Oracle TDE
|
# Oracle TDE
|
||||||
|
|
||||||
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
|
|
||||||
[Oracle Transparent Data Encryption](https://docs.oracle.com/database/121/ASOAG/introduction-to-transparent-data-encryption.htm#ASOAG10270) (TDE)
|
[Oracle Transparent Data Encryption](https://docs.oracle.com/database/121/ASOAG/introduction-to-transparent-data-encryption.htm#ASOAG10270) (TDE)
|
||||||
is supported with the [Vault PKCS#11 provider](/vault/docs/enterprise/pkcs11-provider).
|
is supported with the [Vault PKCS#11 provider](/vault/docs/enterprise/pkcs11-provider).
|
||||||
In this setup, Vault's KMIP engine generates and store the "TDE Master Encryption Key" that the Oracle Database uses to encrypt and decrypt the "TDE Table Keys".
|
In this setup, Vault's KMIP engine generates and store the "TDE Master Encryption Key" that the Oracle Database uses to encrypt and decrypt the "TDE Table Keys".
|
||||||
|
|||||||
@ -7,8 +7,7 @@ description: |-
|
|||||||
|
|
||||||
# Redundancy zones
|
# Redundancy zones
|
||||||
|
|
||||||
-> **Note**: This feature requires [Vault Enterprise](https://www.hashicorp.com/products/vault/)
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
configured to use Integrated Storage.
|
|
||||||
|
|
||||||
Vault Enterprise Redundancy Zones provide both read scaling and resiliency benefits by enabling
|
Vault Enterprise Redundancy Zones provide both read scaling and resiliency benefits by enabling
|
||||||
the deployment of non-voting nodes alongside voting nodes on a per availability zone basis.
|
the deployment of non-voting nodes alongside voting nodes on a per availability zone basis.
|
||||||
|
|||||||
@ -7,14 +7,10 @@ description: >-
|
|||||||
recovery workloads.
|
recovery workloads.
|
||||||
---
|
---
|
||||||
|
|
||||||
# Vault enterprise replication
|
# Vault Enterprise replication
|
||||||
|
|
||||||
## Overview
|
## Overview
|
||||||
|
|
||||||
-> **Note**: All versions of [Vault Enterprise](https://www.hashicorp.com/products/vault/)
|
|
||||||
have support for Disaster Recovery replication. Performance Replication requires
|
|
||||||
Vault Enterprise Premium.
|
|
||||||
|
|
||||||
Many organizations have infrastructure that spans multiple datacenters. Vault
|
Many organizations have infrastructure that spans multiple datacenters. Vault
|
||||||
provides the critical services of identity management, secrets storage, and
|
provides the critical services of identity management, secrets storage, and
|
||||||
policy management. This functionality is expected to be highly available and
|
policy management. This functionality is expected to be highly available and
|
||||||
@ -87,6 +83,8 @@ secondaries to have a different configuration than their primary. Tokens and le
|
|||||||
|
|
||||||
## Performance replication
|
## Performance replication
|
||||||
|
|
||||||
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
|
|
||||||
In Performance Replication, secondaries keep track of their own tokens and leases
|
In Performance Replication, secondaries keep track of their own tokens and leases
|
||||||
but share the underlying configuration, policies, and supporting secrets (K/V values,
|
but share the underlying configuration, policies, and supporting secrets (K/V values,
|
||||||
encryption keys for `transit`, etc).
|
encryption keys for `transit`, etc).
|
||||||
|
|||||||
@ -8,7 +8,7 @@ description: |-
|
|||||||
|
|
||||||
# Seal wrap
|
# Seal wrap
|
||||||
|
|
||||||
-> **Note**: This feature requires [Vault Enterprise Plus](https://www.hashicorp.com/products/vault/).
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
|
|
||||||
Vault Enterprise features a mechanism to wrap values with an extra layer of
|
Vault Enterprise features a mechanism to wrap values with an extra layer of
|
||||||
encryption for supporting [seals](/vault/docs/configuration/seal). This adds an
|
encryption for supporting [seals](/vault/docs/configuration/seal). This adds an
|
||||||
|
|||||||
@ -6,6 +6,8 @@ description: An overview of how Sentinel interacts with Vault Enterprise.
|
|||||||
|
|
||||||
# Examples
|
# Examples
|
||||||
|
|
||||||
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
|
|
||||||
Following are some examples that help to introduce concepts. If you are
|
Following are some examples that help to introduce concepts. If you are
|
||||||
unfamiliar with writing Sentinel policies in Vault, please read through to
|
unfamiliar with writing Sentinel policies in Vault, please read through to
|
||||||
understand some best practices.
|
understand some best practices.
|
||||||
|
|||||||
@ -4,15 +4,9 @@ page_title: Vault Enterprise Sentinel Integration
|
|||||||
description: An overview of how Sentinel interacts with Vault Enterprise.
|
description: An overview of how Sentinel interacts with Vault Enterprise.
|
||||||
---
|
---
|
||||||
|
|
||||||
# Overview
|
# Vault Enterprise and Sentinel integration
|
||||||
|
|
||||||
<Note>
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
|
|
||||||
Sentinel requires [Vault
|
|
||||||
Enterprise](https://www.hashicorp.com/products/vault/pricing/) license, or an
|
|
||||||
[HCP Vault Plus](/hcp/docs/vault/tiers-and-features#plus-tier) cluster.
|
|
||||||
|
|
||||||
</Note>
|
|
||||||
|
|
||||||
Vault Enterprise integrates HashiCorp Sentinel to provide a rich set of access
|
Vault Enterprise integrates HashiCorp Sentinel to provide a rich set of access
|
||||||
control functionality. Because Vault is a security-focused product trusted with
|
control functionality. Because Vault is a security-focused product trusted with
|
||||||
|
|||||||
@ -6,6 +6,8 @@ description: An overview of how Sentinel interacts with Vault Enterprise.
|
|||||||
|
|
||||||
# Properties
|
# Properties
|
||||||
|
|
||||||
|
@include 'alerts/enterprise-and-hcp.mdx'
|
||||||
|
|
||||||
Vault injects a rich set of data into the running Sentinel environment,
|
Vault injects a rich set of data into the running Sentinel environment,
|
||||||
allowing for very fine-grained controls. The set of available properties are
|
allowing for very fine-grained controls. The set of available properties are
|
||||||
enumerated on this page.
|
enumerated on this page.
|
||||||
|
|||||||
@ -7,8 +7,11 @@ description: >-
|
|||||||
|
|
||||||
# Vault EKM provider for SQL server
|
# Vault EKM provider for SQL server
|
||||||
|
|
||||||
-> **Note**: This feature requires [Vault Enterprise](https://www.hashicorp.com/products/vault/)
|
<EnterpriseAlert product="vault">
|
||||||
with the Advanced Data Protection Key Management module.
|
Requires
|
||||||
|
<a href="https://www.hashicorp.com/products/vault/pricing">Vault Enterprise</a>
|
||||||
|
with <b>Advanced Data Protection Key Management</b> module.
|
||||||
|
</EnterpriseAlert>
|
||||||
|
|
||||||
Microsoft SQL Server supports [Transparent Data Encryption][tde] (TDE). The
|
Microsoft SQL Server supports [Transparent Data Encryption][tde] (TDE). The
|
||||||
Database Encryption Keys (DEK) can be protected by asymmetric Key Encryption
|
Database Encryption Keys (DEK) can be protected by asymmetric Key Encryption
|
||||||
|
|||||||
6
website/content/partials/alerts/enterprise-and-hcp.mdx
Normal file
6
website/content/partials/alerts/enterprise-and-hcp.mdx
Normal file
@ -0,0 +1,6 @@
|
|||||||
|
<EnterpriseAlert product="vault">
|
||||||
|
<a href="https://www.hashicorp.com/products/vault/pricing">Vault Enterprise</a>
|
||||||
|
license or
|
||||||
|
<a href="/hcp/docs/vault/tiers-and-features#plus-tier">HCP Vault Plus</a>
|
||||||
|
cluster required
|
||||||
|
</EnterpriseAlert>
|
||||||
4
website/content/partials/alerts/enterprise-only.mdx
Normal file
4
website/content/partials/alerts/enterprise-only.mdx
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
<EnterpriseAlert product="vault">
|
||||||
|
<a href="https://www.hashicorp.com/products/vault/pricing">Vault Enterprise</a>
|
||||||
|
license required
|
||||||
|
</EnterpriseAlert>
|
||||||
Loading…
x
Reference in New Issue
Block a user