We are excited to announce additional hands-on tutorials to help you learn and integrate Vault as your secrets management solution. Several pre-existing tutorials have also been updated.
What's New?
In addition to AliCloud KMS, Amazon KMS, Azure Key Vault, and Google Cloud KMS, Vault 1.1 added support for the Transit Secrets Engine to auto-unseal your Vault.
This guide walks you through the steps necessary to configure Transit Auto-Unseal.
If you don't have a Vault environment to experiment with Transit Auto-Unseal, click the Show Terminal button to launch an interactive tutorial in your web browser.
Vault clients must first authenticate with Vault to acquire a valid token. Vault 1.1 introduced support for OpenID Connect (OIDC) as an auth method which is provided by many authentication services such as Auth0.
This guide walks through the configuration of the OIDC auth method using Auth0 as its OIDC provider.
NOTE: Refer to the Vault OpenID Demo for an example using Google OAuth.
Vault Agent was first introduced in Vault 0.11 as a client daemon to automate the authentication and token lifecycle management. Vault 1.1 introduced its caching mechanism to further improve the efficiency of token and lease management.
The Vault Agent Caching tutorial now has a Katacoda scenario to demonstrate both Auto-Auth and Caching of Vault Agent using the approle
auth method. If you don't have a Vault environment, try the Katacoda interactive tutorial today!
You can find many other educational resources, demo code, and interactive experiences at HashiCorp Learn or attend a training event with one of our training partners.
Do cloud right with The Infrastructure Cloud from HashiCorp. Unlock developer potential while controlling cloud costs and risk.
HCP Vault Radar conducts ongoing reconnaissance of unsecured secrets stored as plain text in code repositories as well as configuration, DevOps, and collaboration tools.
Secrets sync is a new feature in HashiCorp Vault that facilitates centralized management, governance, and control of secrets for multiple external secret managers.