From f6ba366940ec7bed93b2ae4b3c414c4349e2538f Mon Sep 17 00:00:00 2001 From: Brian Kassouf Date: Thu, 20 Feb 2020 15:09:26 -0800 Subject: [PATCH] changelog++ --- CHANGELOG.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index eec246283c..55da92e04b 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -4,13 +4,13 @@ FEATURES: * **Kerberos Authentication**: We now support Kerberos authentication using a SPNEGO token. Login can be performed using the Vault CLI, API, or agent. -* **Optional service_registration stanza**: We have introduced a new optional `service_registration` configuration stanza, that allows for service registration to be configured separately from the storage backend. For more, see [#7887](https://github.com/hashicorp/vault/pull/7887/). * **Kubernetes Service Discovery**: We now support Kubernetes service discovery where, if configured, Vault will tag Vault pods with their current health status. For more, see [#8249](https://github.com/hashicorp/vault/pull/8249). * **MongoDB Atlas Secrets**: We now support generating dynamic credentials for both MongoDB Atlas databases as well as the [Atlas programmatic interface](https://docs.atlas.mongodb.com/tutorial/manage-programmatic-access/). -* **Redshift Database Secrets Engine**: We now support static and dynamic secrets for the Amazon Web Services (AWS) Redshift service. * **OpenLDAP Secrets Engine**: We now support password management of existing OpenLDAP user entries. For more, see [#8360](https://github.com/hashicorp/vault/pull/8360/). +* **Redshift Database Secrets Engine**: We now support static and dynamic secrets for the Amazon Web Services (AWS) Redshift service. +* **Service Registration Config**: We have introduced a new optional `service_registration` configuration stanza, that allows for service registration to be configured separately from the storage backend. For more, see [#7887](https://github.com/hashicorp/vault/pull/7887/). IMPROVEMENTS: