A pair of new HCP Vault verified integrations and ten new self-managed HashiCorp Vault integrations add to the existing list of more than 100 partner Vault integrations.
We continue to see strong growth in the HashiCorp Vault Partner ecosystem as a dozen additional self-managed (open source Vault) and HashiCorp Cloud Platform (HCP) Vault verified integrations were completed this past quarter. These integrations are in addition to the more than 100 integrations with 75 partners. The program has seen 300% growth since 2019.
We are pleased to announce a pair of new HCP Vault verified integrations as well as ten self-managed Vault integrations. The two new HCP Vault integrations have gone through our verification process and earned the “HCP Vault Verified” badge.
HCP Vault is a fully managed platform that is operated by HashiCorp, allowing organizations to get Vault up and running quickly. We are pleased to announce the following existing integrations have now been verified to work with HCP Vault as well as self-managed Vault:
Denodo’s Virtual DataPort, a global solution for heterogeneous and dispersed data source integration in real time, provides support to obtain credentials from HCP Vault to avoid storing credentials in Denodo for the service accounts of your JDBC data sources.
ServiceNow MID servers can use the Vault Credential Resolver to consume secrets directly from HCP Vault for the purpose of performing discovery. Joint customers are now able to use HCP Vault to securely retrieve credentials necessary for agentless discovery and service mapping to ensure complete visibility of their estate. Additionally, credentials from HashiCorp Vault can be utilized in automating workflows to third-party systems. See how the Vault Credential Resolver works with ServiceNow and HCP Vault in this recent webinar: Using HashiCorp Vault as a Centralized Credential Resolver from ServiceNow.
We also saw ten new Vault integrations this quarter:
Cribl’s LogStream routes observability data to where it has the most value. The integration between Cribl LogStream and HashiCorp Vault was added in LogStream version 3.0 and allows customers to offload management of secrets used by Cribl LogStream to Vault. The key management service (KMS) feature can be used to improve the security posture of your LogStream deployment.
Confluent’s Apache Kafka-based platform is a full-scale data streaming platform that enables you to easily access, store, and manage data as continuous real-time streams. The Vault and Confluent Operator integration leverages Vault with Kubernetes to provide only the necessary credentials to Confluent Platform to minimize operational toil and the potential exposure of credentials.
The Vault and Elastic Monitoring platform integration is powered by Elastic Agent to collect logs and metrics from Vault so that they can be monitored within Elastic Observability. Three data streams are sent to the Elastic Stack for different types of monitoring scenarios: audit, logs, and metrics.
JFrog has completed two Vault integrations. The Vault & Artifactory secrets plugin talks to JFrog Artifactory server (5.0.0+) and dynamically provisions access tokens with specified scopes. The backend can be mounted multiple times to provide access to multiple Artifactory servers. Artifactory is used for automating, managing, securing, distributing, and monitoring all types of binaries.
The second integration between the JFrog Platform (used to give customers an end-to-end pipeline to control the flow of binaries from build to production) and Vault enables administrators to configure an external Vault connection for centralized secrets management. You can store JFrog Platform GPG keys, RSA keys, and trusted keys as secrets in Vault.
Micro Focus has completed two Vault integrations. The first is an integration between Vault and ConnectedMX, a secure, cloud-based endpoint data protection solution, where Vault is an external key management server providing encryption keys for encrypting data at rest. The second integration uses Vault as an external credential store to provide credentials to UCMDB (Universal Configuration Management Database) for discovery.
Opsera's continuous orchestration platform can integrate with Vault to store secrets, passwords, keys, and certificates and retrieve them for seamless use in DevOps CI/CD pipelines.
Vault integrates with the Securosys HSM via the PKCS#11 cryptography standard for customers who need hardware-backed security. The integration supports auto unseal and seal migration, cryptographic key generation and management, and external entropy.
Thales CipherTrust Manager (CTM) is an enterprise key-management solution whose recent Vault integration lets customers use CTM to wrap Vault’s master key via PKCS#11 and trigger auto unseal for Vault.
The HashiCorp Vault Integration Program allows for partners to integrate their products to work with HashiCorp Vault (both the open source or Enterprise versions) or HashiCorp Cloud Platform (HCP) Vault. Learn more at https://www.vaultproject.io/docs/partnerships.
As a fully managed service, HCP Vault is the easiest way to secure, store, and tightly control access to tokens, passwords, certificates, encryption keys, and other sensitive data. For more information about HCP Vault and pricing, please visit the HCP product page or sign up through the HCP portal.
More Information on Earlier Vault Integrations:
A recap of HashiCorp infrastructure and security news and developments on AWS from the past year, from self-service provisioning to fighting secrets sprawl and more.
If you’re attending AWS re:Invent in Las Vegas, Nov. 27 - Dec. 1, visit us for breakout sessions, expert talks, and product demos to learn how to accelerate your adoption of a cloud operating model.
10 new HashiCorp Vault ecosystem integrations extend security use cases for customers.