435 Commits

Author SHA1 Message Date
Erica Thompson
0660ea6fac
Update README (#31244)
* Update README

Let contributors know that docs will now be located in UDR

* Add comments to each mdx doc

Comment has been added to all mdx docs that are not partials

* chore: added changelog

changelog check failure

* wip: removed changelog

* Fix content errors

* Doc spacing

* Update website/content/docs/deploy/kubernetes/vso/helm.mdx

Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>

---------

Co-authored-by: jonathanfrappier <92055993+jonathanfrappier@users.noreply.github.com>
Co-authored-by: Tu Nguyen <im2nguyen@users.noreply.github.com>
2025-07-22 08:12:22 -07:00
Rachel Culpepper
b01edf42f9
add ssh managed key documentation (#30764) 2025-07-16 17:10:50 -07:00
Rachel Culpepper
140219c75b
add mac_length to verify docs (#30967) 2025-07-16 17:09:55 -07:00
giogranda85
41360dbf08
Update entity.mdx (#28806)
* Update entity.mdx

Adding warning as a result of multiple support issues.

* Update website/content/api-docs/secret/identity/entity.mdx

---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2025-07-16 16:18:03 -07:00
gerardma77
0a281417bf
ldap.mdx (#28578) 2025-07-15 16:15:28 -07:00
Etourneau Gwenn
06eaa6d500
Added PSC Private Service Connect for GCP CloudSQL (#27889)
* Added PSC Private Service Connect for GCP CloudSQL
Added PrivateIP support for GCP MySQL

* Added changelog

* Update changelog

* Value need to be exported or will be false

* Exported variablee for MySQL as well

* Add test cases

* Add go doc test comments

---------

Co-authored-by: robmonte <17119716+robmonte@users.noreply.github.com>
2025-07-15 11:29:47 -05:00
Michael Kosir
0a80341721
Update transit.mdx (#30828)
add hmac type

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2025-07-14 16:57:40 -07:00
Constantin Biguet
e845a467aa
Add documentation and release notes entry for the Terraform support for dynamic team tokens feature (#31260)
* Add TFC Dynamic Team Credentials feature to Vault 1.20 release notes

* Update website/content/docs/secrets/terraform.mdx

* Update website/content/api-docs/secret/terraform.mdx

* Remove todo in release notes

* Amend Legacy Team section in docs

* Add description field to api-docs
2025-07-11 20:42:50 -04:00
Sarah Chavis
c80deaea07
convert html to md (#31021) 2025-06-19 09:55:06 -07:00
Thy Ton
43c3aa37b9
doc: plugin register API's Enterprise Beta download parameter (#30986)
---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
Co-authored-by: helenfufu <25168806+helenfufu@users.noreply.github.com>
2025-06-19 08:58:51 -07:00
vinay-gopalan
ac335145b7
Add documentation for Snowflake keypair auth support (#30944) 2025-06-18 08:40:12 -07:00
Ellie
6360705f0a
Require rotation_schedule cron style strings to be defined in UTC (VAULT-35616) (#30606)
* remove local time logic, and force cron to be UTC

* add test comment

* update docs

* add changelog

* change mesasge

* add utc clarification to docs

* remove utc reference in root token docs

* remove doc from partial
2025-06-16 12:51:07 -05:00
miagilepner
9b42318e44
VAULT-34525: Documentation for single item recovery from IS snapshot (#30739)
* start

* docs

* everything except the concept doc

* actual progress

* thank you copilot for finding passive voice

* formatting

* add changelog

* fix formatting of changelog

* update changelog

* Update website/content/api-docs/secret/cubbyhole.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/secret/cubbyhole.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/secret/cubbyhole.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/secret/cubbyhole.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/secret/kv/kv-v1.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/secret/cubbyhole.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/concepts/integrated-storage/snapshot-recover.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/secret/cubbyhole.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/secret/kv/kv-v1.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/secret/kv/kv-v1.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Apply suggestions from code review

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* more fixes

* remove example usage

---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2025-06-11 15:50:24 +02:00
Steven Clark
b91470af0a
PKI SCEP documentation updates (#30753)
* most important scep docs

* oops. forgot to commit everything.

* Add docs around SCEP auth

* More SCEP api doc updates

* Add return_full_ca_chain parameter to SCEP config docs

* Remove duplicated EST sections

* Update missing SCEP reference within pki/index.mdx

* PR feedback

* PR feedback 2

* Rename return_full_ca_chain to restrict_ca_chain_to_issuer

* Apply suggestions from code review

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>

* Apply suggestions from code review

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Tweaks to review suggestions from Sarah

* Apply suggestions from code review

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Fix typo

* Fix typo

---------

Co-authored-by: Kit Haines <khaines@mit.edu>
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2025-06-06 13:46:17 -04:00
Steven Clark
62a7ff7968
Add missing protocol path table to CMPv2 API documentation (#30864)
* Add missing protocol path table to CMPv2 API documentation

* Update CODEOWNERS for PKI api-docs
2025-06-06 13:25:28 -04:00
Kit Haines
3f84ada424
Add 192 to the list of key sizes supported in the docs. (#30718)
* Add 192 to the list of key sizes supported in the docs.

* transit Index updated.
2025-06-04 16:02:20 -04:00
Sarah Chavis
8bee09280a
Fix heading level (#30676)
Correct the `## Parameters` heading to be h3 instead.
2025-05-19 14:40:39 -07:00
Luis (LT) Carbonell
ed52371b10
Upgrade FIPS 1402 -> 1403 (#30576)
* Upgrade FIPS 1402 -> 1403

* Clean up

* changelog
2025-05-12 15:01:30 -05:00
Robert
bf339bc50d
Add snowflake DB API warning (#30327)
* Add API warning based on DB type

* Add deprecation notice

* Add warning to the top of the docs pages

* Update capabilities table

* Filter SQLConnectionProducer fields from unrecognized parameters warning

* Add test case
2025-04-28 13:05:55 -05:00
Kit Haines
470df21aaf
API-Docs for new Delta_CRL_Distribution_Points field (#30332)
* API-Docs for new Delta_CRL_Distribution_Points field

* Update website/content/api-docs/secret/pki/index.mdx

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

* Update website/content/api-docs/secret/pki/index.mdx

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

---------

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2025-04-25 11:08:58 -04:00
Kit Haines
2a14b1c616
Allow Root + Intermediate Key_Usage to be set (#30034)
* outline of key usage fix

* Changelog, and test-fix

* Simplify code setting key_usage

* make fmt

* Per internal dicussion to align closer to the CAB guidelines, only allow DigitalSignature.

* Breaking Change: error if invalid key_usage to generate root or sign-intermediate.

* Change error to warning in order to not break backwards compatibility.
2025-04-03 18:48:54 +00:00
Sarah Chavis
4383f5bb9c
make AD secrets plugin EOL (#29923) 2025-03-13 15:14:36 -07:00
Milena Zlaticanin
84fa94c6c1
Add LIST endpoint to AWS Secrets static roles (#29842)
* Add LIST endpoint to AWS Secrets static roles

* add test + changelog

* Update website/content/api-docs/secret/aws.mdx

Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>

* Update website/content/api-docs/secret/aws.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

---------

Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2025-03-12 11:08:12 -07:00
Milena Zlaticanin
d9ea865a84
Updating docs to include new assume role fields (#29649)
* Add assume role fields in docs

* add sample response + note about the new feature

* Add a cross-account section in docs

* Update website/content/api-docs/secret/aws.mdx

Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>

* Update website/content/docs/secrets/aws.mdx

Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>

* Update website/content/docs/secrets/aws.mdx

Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>

* Update website/content/docs/secrets/aws.mdx

Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>

* Update website/content/docs/secrets/aws.mdx

Co-authored-by: Robert <17119716+robmonte@users.noreply.github.com>

* Update website/content/docs/secrets/aws.mdx

Co-authored-by: Robert <17119716+robmonte@users.noreply.github.com>

* Update website/content/api-docs/secret/aws.mdx

Co-authored-by: Robert <17119716+robmonte@users.noreply.github.com>

* Update website/content/api-docs/secret/aws.mdx

Co-authored-by: Robert <17119716+robmonte@users.noreply.github.com>

* update

* Update website/content/api-docs/secret/aws.mdx

Co-authored-by: Robert <17119716+robmonte@users.noreply.github.com>

* Update website/content/docs/secrets/aws.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/docs/secrets/aws.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/secret/aws.mdx

Co-authored-by: Robert <17119716+robmonte@users.noreply.github.com>

* update

* Update website/content/docs/secrets/aws.mdx

Co-authored-by: Robert <17119716+robmonte@users.noreply.github.com>

* update

---------

Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
Co-authored-by: Robert <17119716+robmonte@users.noreply.github.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2025-03-10 12:05:51 -07:00
Robert
35af160994
Add docs for GCP automated root rotation (#29782)
* Fix azure reference

* Add gcp docs

* Fix auth references
2025-03-04 11:58:13 -06:00
vinay-gopalan
1091474e4d
Add docs for scheduled root rotation feature for the AWS and DB engines (#29755) 2025-02-27 15:48:47 -08:00
kpcraig
8497dc66d0
Add docs for plugins with enterprise scheduled root rotation feature (#29608) 2025-02-27 10:44:36 -08:00
Victor Rodriguez
b28ba3046f
Document new PKI CMPv2 configuration field disabled_validations (#29707)
* Document new PKI CMPv2 configuration field disabled_validations.
2025-02-27 09:13:30 -08:00
Steven Clark
17fc0227ad
Add missing parameter signature_bits to the generate root PKI API docs (#29522) 2025-02-07 09:27:51 -05:00
Steven Clark
fbd28dff23
Document new serial_number_source PKI role field (#29438) 2025-01-29 09:42:04 -05:00
Victor Rodriguez
f4fab41e7e
Fix missing permitted_dns_domains parameter when signing certificates (#29436)
* Use PermittedDNSDomains parameter when signing certificates.

* Add missing name constraints extension docs for PKI root/generate.
2025-01-28 14:54:20 -08:00
John-Michael Faircloth
a0ecbe993c
docs: DB skip auto import rotation (#29098)
* docs: DB skip auto import rotation

* add usage section

* add password field; mark self_managed_password as deprecated
2025-01-10 16:17:36 -06:00
Rachel Culpepper
75ddf6e4ed
Add docs for ML-DSA and hybrid keys (#29246)
* add api docs for pqc key types

* add pqc key types to docs

* remove slh-dsa and add hybrid
2025-01-09 14:57:29 -06:00
Kit Haines
55ca52f3fd
Add information about an enterprise feature related to validating iss… (#29300)
* Add information about an enterprise feature related to validating issued certificates to the PKI API docs.

* Update website/content/api-docs/secret/pki/index.mdx

Update RFC name and link, as suggested by Steve.

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

* Update website/content/api-docs/secret/pki/index.mdx

Update RFC name and link, as suggested by Steve.

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

* Update website/content/api-docs/secret/pki/index.mdx

Update RFC name and link, as suggested by Steve.

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

* Update website/content/api-docs/secret/pki/index.mdx

Update RFC name and link, as suggested by Steve.

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

* Update enterprise tag to be on the same line for vercel reasons.

---------

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2025-01-09 11:30:29 -05:00
Steven Clark
e1538468c9
PKI: Add management APIs for ACME accounts (#29173)
* Allow a Vault operator to list, read and update PKI ACME accounts

 - This allows an operator to list the ACME account key ids, read
   the ACME account getting all the various information along with
   the account's associated orders and update the ACME account's
   status to either valid or revoked

* Add tests for new ACME management APIs

* Update PKI api-docs

* Add cl

* Add missing error handling and a few more test assertions

* PR feedback

* Fix Note tags within the website

* Apply suggestions from docscode review

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/secret/pki/issuance.mdx

* Update website/content/api-docs/secret/pki/issuance.mdx

* Update website/content/api-docs/secret/pki/issuance.mdx

---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2025-01-07 09:34:17 -05:00
Victor Rodriguez
b9e949bf73
Support all fields of the name constraints extension when generating CA certificates (#29245)
Support all fields of the name constraints extension when generating CA certs.

The PKI secrets engine only provided parameter permitted_dns_domains to create
the name constraints extension when generating CA certificates.

Add the following parameters to provide full support for the extension:

  * permitted_email_addresses
  * permitted_ip_ranges
  * permitted_uri_domains
  * excluded_dns_domains
  * excluded_email_addresses
  * excluded_ip_ranges
  * excluded_uri_domains

Specifying any combination of these parameters will trigger the creation of the
name constraints extension as per RFC 5280 section 4.2.1.10.
2024-12-20 14:55:25 -05:00
kpcraig
d8482b008a
VAULT-32804: Add STS Fallback parameters to secrets-aws engine (#29051)
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

---------

Co-authored-by: Robert <17119716+robmonte@users.noreply.github.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-12-05 16:22:21 -05:00
Steven Clark
93ca099e3c
Update docs adding use_pss to PKI root generation api (#29023)
- We missed adding this flag to the root CA generation call, but
   we do support it.
2024-11-28 14:30:17 -05:00
Steven Clark
95a16dbafe
PKI: Add a new leaf_not_after_behavior value to force erroring in all circumstances (#28907)
* PKI: Add a new leaf_not_after_behavior value to force erroring in all circumstances

 - We introduce a new value called `always_enforce_err` for the existing
   leaf_not_after_behavior on a PKI issuer. The new value will force we
   error out all requests that have a TTL beyond the issuer's NotAfter value.

 - This will apply to leaf certificates issued through the API as did err,
   but now to CA issuance and ACME requests for which we previously changed
   the err configuration to truncate.

* Add cl

* Update UI test

* Fix changelog type
2024-11-15 11:59:54 -05:00
Steven Clark
2e4a30f914
Fail sign/verify apis when Ed25519ph/ctx arguments are provided on CE (#28838) 2024-11-06 12:23:14 -05:00
miagilepner
10bd15f956
VAULT-30877: Repopulate AWS static creds queue in initialize (#28775)
* populate rotation queue in initialize

* docs, changelog

* add t.Helper()
2024-11-04 09:32:14 -06:00
Steven Clark
e489631e87
Transit: Allow ENT only arguments for sign/verify. Add docs for new Ed25519 signature types (#28821) 2024-11-01 12:57:52 -04:00
Kit Haines
c0b2a6d370
Add enrollment protocol sublinks. (#28737) 2024-10-21 09:18:17 -04:00
Scott Miller
004dfc49f8
Add a max_crl_size parameter to CRL config (#28654)
* wip

* Unit test the CRL limit, wire up config

* Bigger error

* API docs

* wording

* max_crl_entries, + ignore 0 or < -1 values to the config endpoint

* changelog

* rename field in docs

* Update website/content/api-docs/secret/pki/index.mdx

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

* Update website/content/api-docs/secret/pki/index.mdx

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>

---------

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
2024-10-09 21:38:55 +00:00
Scott Miller
3c0656e4c4
Update marcellanz/transit_pkcs1v15 RSA encryption support (#25486)
* [transit-pkcs1v15] transit support for the pkcs1v15 padding scheme – without UI tests (yet).

* [transit-pkcs1v15] renamed padding_scheme parameter in transit documentation.

* [transit-pkcs1v15] add changelog file.

* [transit-pkcs1v15] remove the algorithm path as padding_scheme is chosen by parameter.

* Update ui/app/templates/components/transit-key-action/datakey.hbs

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>

* Update ui/app/templates/components/transit-key-action/datakey.hbs

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>

* Update ui/app/templates/components/transit-key-action/datakey.hbs

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>

* Update website/content/api-docs/secret/transit.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/secret/transit.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Update website/content/api-docs/secret/transit.mdx

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>

* Add warnings to PKCS1v1.5 usage

* Update transit

* Update transit, including separating encrypt/decrypt paddings for rewrap

* Clean up factory use in the presence of padding

* address review feedback

* remove defaults

* lint

* more lint

* Some fixes for UI issues

 - Fix padding scheme dropdown console error by adding values
   to the transit-key-actions.hbs
 - Populate both padding scheme drop down menus within rewrap,
   not just the one padding_scheme
 - Do not submit a padding_scheme value through POST for non-rsa keys

* Fix Transit rewrap API to use decrypt_padding_scheme, encrypt_padding_scheme

 - Map the appropriate API fields for the RSA padding scheme to the
   batch items within the rewrap API
 - Add the ability to create RSA keys within the encrypt API endpoint
 - Add test case for rewrap api that leverages the padding_scheme fields

* Fix code linting issues

* simply padding scheme enum

* Apply suggestions from code review

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>

* Fix padding_scheme processing on data key api

 - The data key api was using the incorrect parameter name for
   the padding scheme
 - Enforce that padding_scheme is only used on RSA keys, we
   are punting on supporting it for managed keys at the moment.

* Add tests for parsePaddingSchemeArg

* Add missing copywrite headers

* Some small UI fixes

* Add missing param to datakey in api-docs

* Do not send padding_scheme for non-RSA key types within UI

* add UI tests for transit key actions form

---------

Co-authored-by: Marcel Lanz <marcellanz@n-1.ch>
Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
Co-authored-by: Steve Clark <steven.clark@hashicorp.com>
Co-authored-by: claire bontempo <cbontempo@hashicorp.com>
2024-10-09 09:30:14 -05:00
vinay-gopalan
08e8776dfb
Add documentation for new rootless password rotation workflow for DB Static Roles (#28374)
Co-authored-by: John-Michael Faircloth <fairclothjm@users.noreply.github.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2024-10-07 15:51:30 +00:00
Steven Clark
baf794b621
Remove duplicated allow_empty_principals parameter in role api docs (#28580) 2024-10-03 09:54:22 -04:00
Steven Clark
70d5c5e582
Update ssh docs to add missing conditional for valid_principals (#28530) 2024-09-27 17:13:20 -04:00
Steven Clark
2db2a9fb5d
PKI: Track last time auto tidy was run across restarts (#28488)
* Track the last PKI auto-tidy time ran for use across nodes

 - If the interval time for auto-tidy is longer then say a regularly
   scheduled restart of Vault, auto-tidy is never run. This is due to
   the time of the last run of tidy is only kept in memory and
   initialized on startup to the current time
 - Store the last run of any tidy, to maintain previous behavior, to
   a cluster local file, which is read in/initialized upon a mount
   initialization.

* Add auto-tidy configuration fields for backing off at startup

* Add new auto-tidy fields to UI

* Update api docs for auto-tidy

* Add cl

* Update field description text

* Apply Claire's suggestions from code review

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>

* Implementing PR feedback from the UI team

* remove explicit defaults and types so we retrieve from backend, decouple enabling auto tidy from duration, move params to auto settings section

---------

Co-authored-by: claire bontempo <68122737+hellobontempo@users.noreply.github.com>
Co-authored-by: claire bontempo <cbontempo@hashicorp.com>
2024-09-26 09:47:11 -04:00
Scott Miller
12f03b073a
Make reception of an empty valid principals configurable based on a role flag. (#28466)
* Make reception of an empty valid principals configurable based on a role flag.

Adds allow_empty_principals, which if true allows valid_principals on credential generation calls
to be empty.

* changelog

* Allow empty principals on unrelated unit test

* whitespace
2024-09-23 17:20:11 -05:00