Make enterprise callouts consistent (#22073)

This commit is contained in:
Sarah Chavis 2023-07-27 10:41:14 -07:00 committed by GitHub
parent 769fe0b67d
commit b6d973a133
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
49 changed files with 107 additions and 67 deletions

View File

@ -1611,7 +1611,9 @@ source is more consistent with expectations of external apps, but see
the [PKI Considerations](/vault/docs/secrets/pki/considerations) page the [PKI Considerations](/vault/docs/secrets/pki/considerations) page
for a discussion on cluster size and unified CRLs/OCSP. for a discussion on cluster size and unified CRLs/OCSP.
~> Note: Unified CRLs are a Vault Enterprise only feature. <EnterpriseAlert product="vault">
Unified CRLs require a Vault Enterprise license or HCP Plus cluster.
</EnterpriseAlert>
These are unauthenticated endpoints. These are unauthenticated endpoints.
@ -1691,7 +1693,9 @@ source is more consistent with expectations of external apps, but see
the [PKI Considerations](/vault/docs/secrets/pki/considerations) page the [PKI Considerations](/vault/docs/secrets/pki/considerations) page
for a discussion on cluster size and unified CRLs/OCSP. for a discussion on cluster size and unified CRLs/OCSP.
~> Note: Unified OCSP is a Vault Enterprise only feature. <EnterpriseAlert product="vault">
Unified OCSP requires a Vault Enterprise license or HCP Plus cluster.
</EnterpriseAlert>
At this time there are certain limitations of the OCSP implementation at this path: At this time there are certain limitations of the OCSP implementation at this path:
@ -3820,7 +3824,8 @@ the CRL.
revocations on, to regenerate the delta CRL. Must be shorter than CRL revocations on, to regenerate the delta CRL. Must be shorter than CRL
expiry. expiry.
- `cross_cluster_revocation` `(bool: false)` - Enables cross-cluster revocation - `cross_cluster_revocation` `(bool: false)` -
<EnterpriseAlert product="vault" inline /> Enables cross-cluster revocation
request queues. When a serial not issued on this local cluster is presented request queues. When a serial not issued on this local cluster is presented
to Vault via the [`/revoke` API](#revoke-certificate), it is replicated to Vault via the [`/revoke` API](#revoke-certificate), it is replicated
across clusters and the cluster which issued that certificate will revoke across clusters and the cluster which issued that certificate will revoke
@ -3831,11 +3836,10 @@ the CRL.
cross-cluster revocation request will be created.<br /><br /> cross-cluster revocation request will be created.<br /><br />
API calls to revoke a certificate with Proof of Possession (PoP) cannot API calls to revoke a certificate with Proof of Possession (PoP) cannot
be satisfied if the certificate is not available locally and will be satisfied if the certificate is not available locally and will
not result in a cross-cluster revocation request. not result in a cross-cluster revocation request.
~> Note: `cross_cluster_revocation` is a Vault Enterprise only feature. - `unified_crl` `(bool: false)` -
<EnterpriseAlert product="vault" inline /> Enables unified CRL and OCSP building. This
- `unified_crl` `(bool: false)` - Enables unified CRL and OCSP building. This
synchronizes all revocations between clusters; a single, unified CRL will be synchronizes all revocations between clusters; a single, unified CRL will be
built on the active node of the primary performance replication (PR) built on the active node of the primary performance replication (PR)
cluster. Any node in any PR cluster will be able to serve this unified CRL cluster. Any node in any PR cluster will be able to serve this unified CRL
@ -3846,17 +3850,14 @@ the CRL.
cluster, but revoked via BYOC on another, this option will inform the cluster, but revoked via BYOC on another, this option will inform the
issuing cluster of the revocation. issuing cluster of the revocation.
~> Note: `unified_crl` is a Vault Enterprise only feature. - `unified_crl_on_existing_paths` `(bool: false)` -
<EnterpriseAlert product="vault" inline /> Enables serving the
- `unified_crl_on_existing_paths` `(bool: false)` - Enables serving the
unified CRL and OCSP on the existing, previously cluster-local paths unified CRL and OCSP on the existing, previously cluster-local paths
(e.g., `/pki/crl` will now contain the unified CRL when enabled). This (e.g., `/pki/crl` will now contain the unified CRL when enabled). This
allows transitioning AIA-based consumption of CRLs to a unified view allows transitioning AIA-based consumption of CRLs to a unified view
without having to re-issue certificates or update scripts pulling without having to re-issue certificates or update scripts pulling
a single CRL. a single CRL.
~> Note: `unified_crl_on_existing_paths` is a Vault Enterprise only feature.
#### Sample payload #### Sample payload
```json ```json

View File

@ -6,7 +6,7 @@ description: The '/sys/config/control-group' endpoint configures control groups.
# `/sys/config/control-group` # `/sys/config/control-group`
~> **Enterprise Only**  These endpoints require Vault Enterprise. @include 'alerts/enterprise-and-hcp.mdx'
The `/sys/config/control-group` endpoint is used to configure Control Group The `/sys/config/control-group` endpoint is used to configure Control Group
settings. settings.

View File

@ -6,7 +6,7 @@ description: The '/sys/config/group-policy-application' endpoint is used to conf
# `/sys/config/group-policy-application` # `/sys/config/group-policy-application`
~> **Enterprise Only**  These endpoints require Vault Enterprise Platform. @include 'alerts/enterprise-and-hcp.mdx'
The `sys/config/group-policy-application` endpoint can be used to configure the The `sys/config/group-policy-application` endpoint can be used to configure the
mode of policy application for identity groups in Vault. This setting dictates mode of policy application for identity groups in Vault. This setting dictates

View File

@ -17,9 +17,7 @@ Currently, it only supports reloading license information from files on disk.
- `subsystem` `(string: <required>)` - Specifies the subsystem for Vault to reload. This is part of the request URL. - `subsystem` `(string: <required>)` - Specifies the subsystem for Vault to reload. This is part of the request URL.
## Reload license file ## Reload license file <EnterpriseAlert product="vault" inline />
~> **Enterprise Only** This endpoint requires Vault Enterprise.
When the `:subsystem` URL parameter is specified as `license`, Vault re-reads When the `:subsystem` URL parameter is specified as `license`, Vault re-reads
the license file if the license was provided using the `license_path` configuration the license file if the license was provided using the `license_path` configuration

View File

@ -6,7 +6,7 @@ description: The '/sys/control-group' endpoint handles the Control Group workflo
## Authorize control group request ## Authorize control group request
~> **Enterprise Only**  These endpoints require Vault Enterprise. @include 'alerts/enterprise-and-hcp.mdx'
This endpoint authorizes a control group request. This endpoint authorizes a control group request.

View File

@ -6,7 +6,7 @@ description: The `/sys/quotas/lease-count` endpoint is used to create, edit and
# `/sys/quotas/lease-count` # `/sys/quotas/lease-count`
~> **Enterprise Only**  These endpoints require Vault Enterprise Platform. @include 'alerts/enterprise-and-hcp.mdx'
The `/sys/quotas/lease-count` endpoint is used to create, edit and delete lease count quotas. The `/sys/quotas/lease-count` endpoint is used to create, edit and delete lease count quotas.

View File

@ -8,7 +8,7 @@ description: |-
# `/sys/license/status` # `/sys/license/status`
~> **Enterprise Only** These endpoints require Vault Enterprise. @include 'alerts/enterprise-and-hcp.mdx'
The `/sys/license/status` endpoint is used to view update the license used in The `/sys/license/status` endpoint is used to view update the license used in
Vault. Vault.

View File

@ -99,7 +99,9 @@ $ curl \
#### PKCS#11 backend parameters #### PKCS#11 backend parameters
~> NOTE: The `pkcs11` backend is only available with Vault Enterprise Plus (HSMs) edition <Note>
The <code>pkcs11</code> backend is only available with Vault Enterprise plus HSMs
</Note>
- `type` `(string: "pkcs11")` - To select a PKCS#11 backend, the type parameter must be set to `pkcs11`. - `type` `(string: "pkcs11")` - To select a PKCS#11 backend, the type parameter must be set to `pkcs11`.

View File

@ -10,7 +10,11 @@ description: >-
The `/sys/policies` endpoints are used to manage ACL, RGP, and EGP policies in Vault. The `/sys/policies` endpoints are used to manage ACL, RGP, and EGP policies in Vault.
~> **NOTE**: This endpoint is only available in Vault version 0.9+. Please also note that RGPs and EGPs are Vault Enterprise Premium features and the associated endpoints are not available in Vault Open Source or Vault Enterprise Pro. <Note>
<code>/sys/policies</code> endpoints are only available in Vault version 0.9+.
RGPs and EGPs are Vault Enterprise upgrade features that are not available in
Vault Open Source or basic Vault Enterprise installations.
</Note>
## List ACL policies ## List ACL policies

View File

@ -8,7 +8,7 @@ description: >-
# `/sys/replication` # `/sys/replication`
~> **Enterprise Only**  These endpoints require Vault Enterprise. @include 'alerts/enterprise-and-hcp.mdx'
## Attempt recovery ## Attempt recovery

View File

@ -8,7 +8,7 @@ description: >-
# `/sys/replication/dr` # `/sys/replication/dr`
~> **Enterprise Only**  These endpoints require Vault Enterprise. @include 'alerts/enterprise-only.mdx'
## Check DR status ## Check DR status

View File

@ -8,7 +8,7 @@ description: >-
# `/sys/replication/performance` # `/sys/replication/performance`
~> **Enterprise Only**  These endpoints require Vault Enterprise. @include 'alerts/enterprise-and-hcp.mdx'
## Check performance status ## Check performance status

View File

@ -8,7 +8,7 @@ description: >-
# `/sys/sealwrap/rewrap` # `/sys/sealwrap/rewrap`
~> **Enterprise Only**  These endpoints require Vault Enterprise. @include 'alerts/enterprise-and-hcp.mdx'
The `/sys/sealwrap/rewrap` endpoint is used to rewrap all seal wrapped entries. The `/sys/sealwrap/rewrap` endpoint is used to rewrap all seal wrapped entries.
This is useful when you want to upgrade seal wrapped entries to use the latest This is useful when you want to upgrade seal wrapped entries to use the latest

View File

@ -16,7 +16,7 @@ snapshots with Vault's Raft storage backend.
## Create/update an automated snapshots config ## Create/update an automated snapshots config
-> **Note**: This feature requires [Vault Enterprise](https://www.hashicorp.com/products/vault/) @include 'alerts/enterprise-and-hcp.mdx'
**This endpoint requires sudo capability.** **This endpoint requires sudo capability.**

View File

@ -9,7 +9,7 @@ description: |-
# Automated integrated storage snapshots # Automated integrated storage snapshots
-> **Note**: This feature requires [Vault Enterprise](https://www.hashicorp.com/products/vault/) @include 'alerts/enterprise-and-hcp.mdx'
Any production system should include a provision for taking regular backups. Any production system should include a provision for taking regular backups.
Vault Enterprise can be configured to take and store snapshots at a specific Vault Enterprise can be configured to take and store snapshots at a specific

View File

@ -7,10 +7,10 @@ description: |-
# Automated upgrades # Automated upgrades
~> **Note**: Automated Upgrades requires [Vault Enterprise](https://www.hashicorp.com/products/vault/) to be @include 'alerts/enterprise-only.mdx'
configured to use Integrated Storage.
Vault Enterprise Automated Upgrades allows operators to upgrade the Vault version currently running in a cluster automatically. Operators running Vault Enterprise with integrated storage can use automated
upgrades to upgrade the Vault version currently running in a cluster automatically.
There are a few different ways to make this upgrade happen, There are a few different ways to make this upgrade happen,
and control which versions are being upgraded to. With no additional configuration, and control which versions are being upgraded to. With no additional configuration,
Vault will check the version of Vault that each node in the cluster is running. If a blue/green Vault will check the version of Vault that each node in the cluster is running. If a blue/green

View File

@ -6,6 +6,8 @@ description: Vault Enterprise Consistency Model
# Vault eventual consistency # Vault eventual consistency
@include 'alerts/enterprise-and-hcp.mdx'
When running in a cluster, Vault has an eventual consistency model. When running in a cluster, Vault has an eventual consistency model.
Only one node (the leader) can write to Vault's storage. Only one node (the leader) can write to Vault's storage.
Users generally expect read-after-write consistency: in other Users generally expect read-after-write consistency: in other

View File

@ -4,9 +4,9 @@ page_title: Vault Enterprise Control Groups
description: Vault Enterprise has support for Control Group Authorization. description: Vault Enterprise has support for Control Group Authorization.
--- ---
# Vault enterprise control groups # Vault Enterprise control groups
-> **Note**: This feature requires [Vault Enterprise Plus](https://www.hashicorp.com/products/vault/). @include 'alerts/enterprise-and-hcp.mdx'
Vault Enterprise has support for Control Group Authorization. Control Groups Vault Enterprise has support for Control Group Authorization. Control Groups
add additional authorization factors to be required before satisfying a request. add additional authorization factors to be required before satisfying a request.

View File

@ -8,9 +8,12 @@ description: |-
# Entropy augmentation # Entropy augmentation
-> **Note**: This feature requires [Vault Enterprise Plus](https://www.hashicorp.com/products/vault/). @include 'alerts/enterprise-only.mdx'
~> **Warning** This feature is not available with FIPS 140-2 Inside variants of Vault. <Warning>
Entropy augmentation <b>is not</b> available with "FIPS 140-2 Inside" variants of
Vault.
</Warning>
Vault Enterprise features a mechanism to sample entropy (or randomness for Vault Enterprise features a mechanism to sample entropy (or randomness for
cryptographic operations) from external cryptographic modules via the [seals](/vault/docs/configuration/seal) cryptographic operations) from external cryptographic modules via the [seals](/vault/docs/configuration/seal)

View File

@ -8,7 +8,7 @@ description: |-
# FIPS 140-2 inside # FIPS 140-2 inside
-> **Note**: This feature requires [Vault Enterprise Plus](https://www.hashicorp.com/products/vault/). @include 'alerts/enterprise-only.mdx'
Special builds of Vault Enterprise (marked with a `fips1402` feature name) Special builds of Vault Enterprise (marked with a `fips1402` feature name)
include built-in support for FIPS 140-2 compliance. Unlike using Seal Wrap include built-in support for FIPS 140-2 compliance. Unlike using Seal Wrap

View File

@ -6,6 +6,8 @@ description: An overview of FIPS compliance in Vault.
# FIPS # FIPS
@include 'alerts/enterprise-only.mdx'
The [Federal Information Processing Standard](https://www.nist.gov/federal-information-standards-fips) The [Federal Information Processing Standard](https://www.nist.gov/federal-information-standards-fips)
is a cryptography-focused certification standard for U.S. Government usage. is a cryptography-focused certification standard for U.S. Government usage.

View File

@ -9,7 +9,7 @@ description: |-
# Seal wrap for FIPS compliance # Seal wrap for FIPS compliance
-> **Note**: This feature requires [Vault Enterprise Plus](https://www.hashicorp.com/products/vault/). @include 'alerts/enterprise-only.mdx'
Vault Enterprise features a mechanism to wrap values with an extra layer of Vault Enterprise features a mechanism to wrap values with an extra layer of
encryption for supporting [seals](/vault/docs/configuration/seal). This adds an encryption for supporting [seals](/vault/docs/configuration/seal). This adds an

View File

@ -8,6 +8,8 @@ description: >-
# Vault enterprise HSM behavioral changes # Vault enterprise HSM behavioral changes
@include 'alerts/enterprise-and-hcp.mdx'
This page contains information about the behavioral differences that take This page contains information about the behavioral differences that take
effect when using Vault with an HSM. effect when using Vault with an HSM.

View File

@ -8,7 +8,7 @@ description: >-
# Vault enterprise HSM support # Vault enterprise HSM support
-> **Note**: This feature requires [Vault Enterprise Plus](https://www.hashicorp.com/products/vault/). @include 'alerts/enterprise-and-hcp.mdx'
- Root key Wrapping: Vault protects its root key by transiting it through - Root key Wrapping: Vault protects its root key by transiting it through
the HSM for encryption rather than splitting into key shares the HSM for encryption rather than splitting into key shares

View File

@ -6,6 +6,8 @@ description: Recommendations to ensure the security of a Vault Enterprise HSM de
# Vault enterprise HSM security details # Vault enterprise HSM security details
@include 'alerts/enterprise-and-hcp.mdx'
This page provides information to help ensure that a Vault HSM deployment is This page provides information to help ensure that a Vault HSM deployment is
performed as securely as possible. performed as securely as possible.

View File

@ -7,6 +7,8 @@ description: |-
# Lease count quotas # Lease count quotas
@include 'alerts/enterprise-only.mdx'
Vault features an extension to resource quotas that allows operators to enforce Vault features an extension to resource quotas that allows operators to enforce
limits on how many leases are created. For a given lease count quota, if the limits on how many leases are created. For a given lease count quota, if the
number of leases in the cluster hits the configured limit, `max_leases`, additional number of leases in the cluster hits the configured limit, `max_leases`, additional

View File

@ -6,6 +6,8 @@ description: An overview of license autoloading.
# License autoloading # License autoloading
@include 'alerts/enterprise-and-hcp.mdx'
Prior to Vault 1.8, Vault Enterprise would be licensed using special binaries Prior to Vault 1.8, Vault Enterprise would be licensed using special binaries
that contained embedded licenses, or via a license written into Vault storage that contained embedded licenses, or via a license written into Vault storage
using the [POST sys/license API](/vault/api-docs/system/license#install-license). using the [POST sys/license API](/vault/api-docs/system/license#install-license).

View File

@ -6,6 +6,8 @@ description: An overview of license.
# Vault license # Vault license
@include 'alerts/enterprise-and-hcp.mdx'
Licenses and EULA enhancements have been introduced in Vault 1.8 release. Please refer to the [FAQ](/vault/docs/enterprise/license/faq) for common questions concerning these changes. Licenses and EULA enhancements have been introduced in Vault 1.8 release. Please refer to the [FAQ](/vault/docs/enterprise/license/faq) for common questions concerning these changes.
The [Install a HashiCorp Enterprise License](/vault/tutorials/enterprise/hashicorp-enterprise-license) tutorial provides the instruction to load your Vault license. The [Install a HashiCorp Enterprise License](/vault/tutorials/enterprise/hashicorp-enterprise-license) tutorial provides the instruction to load your Vault license.

View File

@ -7,6 +7,8 @@ description: >-
# Automated license utilization reporting # Automated license utilization reporting
@include 'alerts/enterprise-and-hcp.mdx'
Automated license utilization reporting sends license utilization data to Automated license utilization reporting sends license utilization data to
HashiCorp without requiring you to manually collect and report them. It also HashiCorp without requiring you to manually collect and report them. It also
lets you review your license usage with the monitoring solution you already use lets you review your license usage with the monitoring solution you already use

View File

@ -7,6 +7,7 @@ description: >-
# Managed keys # Managed keys
@include 'alerts/enterprise-and-hcp.mdx'
Within certain environments, customers want to leverage key management systems Within certain environments, customers want to leverage key management systems
external to Vault, when handling, storing, and interacting with external to Vault, when handling, storing, and interacting with

View File

@ -8,7 +8,7 @@ description: >-
# Vault enterprise MFA support # Vault enterprise MFA support
-> **Note**: This section highlights the Step-up Enterprise MFA feature and its capabilities specifically available for [Vault Enterprise](https://www.hashicorp.com/products/vault/) users. @include 'alerts/enterprise-and-hcp.mdx'
Vault Enterprise has support for Multi-factor Authentication (MFA), using Vault Enterprise has support for Multi-factor Authentication (MFA), using
different authentication types. MFA is built on top of the Identity system of different authentication types. MFA is built on top of the Identity system of

View File

@ -6,6 +6,8 @@ description: Vault Enterprise supports Duo MFA type.
# Duo MFA # Duo MFA
@include 'alerts/enterprise-and-hcp.mdx'
This page demonstrates the Duo MFA on ACL'd paths of Vault. This page demonstrates the Duo MFA on ACL'd paths of Vault.
## Configuration ## Configuration

View File

@ -6,6 +6,8 @@ description: Vault Enterprise supports Okta MFA type.
# Okta MFA # Okta MFA
@include 'alerts/enterprise-and-hcp.mdx'
This page demonstrates the Okta MFA on ACL'd paths of Vault. This page demonstrates the Okta MFA on ACL'd paths of Vault.
## Configuration ## Configuration

View File

@ -6,6 +6,8 @@ description: Vault Enterprise supports PingID MFA type.
# PingID MFA # PingID MFA
@include 'alerts/enterprise-and-hcp.mdx'
This page demonstrates PingID MFA on ACL'd paths of Vault. This page demonstrates PingID MFA on ACL'd paths of Vault.
## Configuration ## Configuration

View File

@ -6,6 +6,8 @@ description: Vault Enterprise supports TOTP MFA type.
# TOTP MFA # TOTP MFA
@include 'alerts/enterprise-and-hcp.mdx'
This page demonstrates the TOTP MFA on ACL'd paths of Vault. This page demonstrates the TOTP MFA on ACL'd paths of Vault.
## Configuration ## Configuration

View File

@ -6,14 +6,7 @@ description: >-
Multi-tenancy (SMT) and self-management. Multi-tenancy (SMT) and self-management.
--- ---
# Vault enterprise namespaces # Vault Enterprise namespaces
<Note>
This feature is available in all versions of [Vault
Enterprise](https://www.hashicorp.com/products/vault/).
</Note>
Many organizations implement Vault as a "service", providing centralized Many organizations implement Vault as a "service", providing centralized
management for teams within an organization while ensuring that those teams management for teams within an organization while ensuring that those teams

View File

@ -6,7 +6,7 @@ description: Performance Standby Nodes - Vault Enterprise
# Performance standby nodes # Performance standby nodes
-> **Note**: This feature requires [Vault Enterprise Premium](https://www.hashicorp.com/products/vault/). @include 'alerts/enterprise-and-hcp.mdx'
Vault supports a multi-server mode for high availability. This mode protects Vault supports a multi-server mode for high availability. This mode protects
against outages by running multiple Vault servers. High availability mode against outages by running multiple Vault servers. High availability mode

View File

@ -7,6 +7,8 @@ description: |-
# Vault with AWS KMS external key store (XKS) via PKCS#11 and XKS proxy # Vault with AWS KMS external key store (XKS) via PKCS#11 and XKS proxy
@include 'alerts/enterprise-and-hcp.mdx'
~> **Note**: AWS [`xks-proxy`](https://github.com/aws-samples/aws-kms-xks-proxy) is used in this document as a sample implementation. ~> **Note**: AWS [`xks-proxy`](https://github.com/aws-samples/aws-kms-xks-proxy) is used in this document as a sample implementation.
Vault's KMIP Secrets Engine can be used as an external key store for the AWS KMS [External Key Store (XKS)](https://aws.amazon.com/blogs/aws/announcing-aws-kms-external-key-store-xks/) protocol using the AWS [`xks-proxy`](https://github.com/aws-samples/aws-kms-xks-proxy) along Vault's KMIP Secrets Engine can be used as an external key store for the AWS KMS [External Key Store (XKS)](https://aws.amazon.com/blogs/aws/announcing-aws-kms-external-key-store-xks/) protocol using the AWS [`xks-proxy`](https://github.com/aws-samples/aws-kms-xks-proxy) along

View File

@ -9,6 +9,8 @@ description: |-
# PKCS#11 provider # PKCS#11 provider
@include 'alerts/enterprise-and-hcp.mdx'
[PKCS#11](http://docs.oasis-open.org/pkcs11/pkcs11-base/v2.40/os/pkcs11-base-v2.40-os.html) [PKCS#11](http://docs.oasis-open.org/pkcs11/pkcs11-base/v2.40/os/pkcs11-base-v2.40-os.html)
is an open standard C API that provides a means to access cryptographic capabilities on a device. is an open standard C API that provides a means to access cryptographic capabilities on a device.
For example, it is often used to access a Hardware Security Module (HSM) (like a [Yubikey](https://www.yubico.com/)) from a local program (such as [GPG](https://gnupg.org/)). For example, it is often used to access a Hardware Security Module (HSM) (like a [Yubikey](https://www.yubico.com/)) from a local program (such as [GPG](https://gnupg.org/)).

View File

@ -7,6 +7,8 @@ description: |-
# Oracle TDE # Oracle TDE
@include 'alerts/enterprise-and-hcp.mdx'
[Oracle Transparent Data Encryption](https://docs.oracle.com/database/121/ASOAG/introduction-to-transparent-data-encryption.htm#ASOAG10270) (TDE) [Oracle Transparent Data Encryption](https://docs.oracle.com/database/121/ASOAG/introduction-to-transparent-data-encryption.htm#ASOAG10270) (TDE)
is supported with the [Vault PKCS#11 provider](/vault/docs/enterprise/pkcs11-provider). is supported with the [Vault PKCS#11 provider](/vault/docs/enterprise/pkcs11-provider).
In this setup, Vault's KMIP engine generates and store the "TDE Master Encryption Key" that the Oracle Database uses to encrypt and decrypt the "TDE Table Keys". In this setup, Vault's KMIP engine generates and store the "TDE Master Encryption Key" that the Oracle Database uses to encrypt and decrypt the "TDE Table Keys".

View File

@ -7,8 +7,7 @@ description: |-
# Redundancy zones # Redundancy zones
-> **Note**: This feature requires [Vault Enterprise](https://www.hashicorp.com/products/vault/) @include 'alerts/enterprise-and-hcp.mdx'
configured to use Integrated Storage.
Vault Enterprise Redundancy Zones provide both read scaling and resiliency benefits by enabling Vault Enterprise Redundancy Zones provide both read scaling and resiliency benefits by enabling
the deployment of non-voting nodes alongside voting nodes on a per availability zone basis. the deployment of non-voting nodes alongside voting nodes on a per availability zone basis.

View File

@ -7,14 +7,10 @@ description: >-
recovery workloads. recovery workloads.
--- ---
# Vault enterprise replication # Vault Enterprise replication
## Overview ## Overview
-> **Note**: All versions of [Vault Enterprise](https://www.hashicorp.com/products/vault/)
have support for Disaster Recovery replication. Performance Replication requires
Vault Enterprise Premium.
Many organizations have infrastructure that spans multiple datacenters. Vault Many organizations have infrastructure that spans multiple datacenters. Vault
provides the critical services of identity management, secrets storage, and provides the critical services of identity management, secrets storage, and
policy management. This functionality is expected to be highly available and policy management. This functionality is expected to be highly available and
@ -87,6 +83,8 @@ secondaries to have a different configuration than their primary. Tokens and le
## Performance replication ## Performance replication
@include 'alerts/enterprise-and-hcp.mdx'
In Performance Replication, secondaries keep track of their own tokens and leases In Performance Replication, secondaries keep track of their own tokens and leases
but share the underlying configuration, policies, and supporting secrets (K/V values, but share the underlying configuration, policies, and supporting secrets (K/V values,
encryption keys for `transit`, etc). encryption keys for `transit`, etc).

View File

@ -8,7 +8,7 @@ description: |-
# Seal wrap # Seal wrap
-> **Note**: This feature requires [Vault Enterprise Plus](https://www.hashicorp.com/products/vault/). @include 'alerts/enterprise-and-hcp.mdx'
Vault Enterprise features a mechanism to wrap values with an extra layer of Vault Enterprise features a mechanism to wrap values with an extra layer of
encryption for supporting [seals](/vault/docs/configuration/seal). This adds an encryption for supporting [seals](/vault/docs/configuration/seal). This adds an

View File

@ -6,6 +6,8 @@ description: An overview of how Sentinel interacts with Vault Enterprise.
# Examples # Examples
@include 'alerts/enterprise-and-hcp.mdx'
Following are some examples that help to introduce concepts. If you are Following are some examples that help to introduce concepts. If you are
unfamiliar with writing Sentinel policies in Vault, please read through to unfamiliar with writing Sentinel policies in Vault, please read through to
understand some best practices. understand some best practices.

View File

@ -4,15 +4,9 @@ page_title: Vault Enterprise Sentinel Integration
description: An overview of how Sentinel interacts with Vault Enterprise. description: An overview of how Sentinel interacts with Vault Enterprise.
--- ---
# Overview # Vault Enterprise and Sentinel integration
<Note> @include 'alerts/enterprise-and-hcp.mdx'
Sentinel requires [Vault
Enterprise](https://www.hashicorp.com/products/vault/pricing/) license, or an
[HCP Vault Plus](/hcp/docs/vault/tiers-and-features#plus-tier) cluster.
</Note>
Vault Enterprise integrates HashiCorp Sentinel to provide a rich set of access Vault Enterprise integrates HashiCorp Sentinel to provide a rich set of access
control functionality. Because Vault is a security-focused product trusted with control functionality. Because Vault is a security-focused product trusted with

View File

@ -6,6 +6,8 @@ description: An overview of how Sentinel interacts with Vault Enterprise.
# Properties # Properties
@include 'alerts/enterprise-and-hcp.mdx'
Vault injects a rich set of data into the running Sentinel environment, Vault injects a rich set of data into the running Sentinel environment,
allowing for very fine-grained controls. The set of available properties are allowing for very fine-grained controls. The set of available properties are
enumerated on this page. enumerated on this page.

View File

@ -7,8 +7,11 @@ description: >-
# Vault EKM provider for SQL server # Vault EKM provider for SQL server
-> **Note**: This feature requires [Vault Enterprise](https://www.hashicorp.com/products/vault/) <EnterpriseAlert product="vault">
with the Advanced Data Protection Key Management module. Requires&nbsp;
<a href="https://www.hashicorp.com/products/vault/pricing">Vault Enterprise</a>
&nbsp;with <b>Advanced Data Protection Key Management</b> module.
</EnterpriseAlert>
Microsoft SQL Server supports [Transparent Data Encryption][tde] (TDE). The Microsoft SQL Server supports [Transparent Data Encryption][tde] (TDE). The
Database Encryption Keys (DEK) can be protected by asymmetric Key Encryption Database Encryption Keys (DEK) can be protected by asymmetric Key Encryption

View File

@ -0,0 +1,6 @@
<EnterpriseAlert product="vault">
<a href="https://www.hashicorp.com/products/vault/pricing">Vault Enterprise</a>
&nbsp;license or&nbsp;
<a href="/hcp/docs/vault/tiers-and-features#plus-tier">HCP Vault Plus</a>
&nbsp;cluster required
</EnterpriseAlert>

View File

@ -0,0 +1,4 @@
<EnterpriseAlert product="vault">
<a href="https://www.hashicorp.com/products/vault/pricing">Vault Enterprise</a>
&nbsp; license required
</EnterpriseAlert>