HashiCorp Vault 0.8.1
We are proud to announce the release of HashiCorp Vault 0.8.1, which includes a number of exciting new features, improvements, and bug fixes.
In addition to some bug fixes and minor enhancements, Vault 0.8.1 contains new functionality including the following new features:
-
Google Cloud Platform IAM Authentication Backend: Vault now supports authentication using Google Cloud IAM identities.
This is a feature developed by Google’s Open Source team in collaboration with the HashiCorp Vault Team. See their blog post for more details.
-
Oracle Database Secret Backend: Vault now supports dynamically generating credentials for Oracle databases via an external plugin. See the plugin's repository for more details.
-
PingID Push Support for Path-Based MFA (Enterprise): PingID Push can now be used for MFA with the new path-based MFA introduced in Vault Enterprise 0.8.
-
Permitted DNS Domains Support in PKI: The pki backend now supports specifying permitted DNS domains for CA certificates, allowing you to narrowly scope the set of domains for which a CA can issue or sign child certificates. This is supported for both root and intermediate CA certificates.
-
Plugin Backend Reload Endpoint: Plugin backends can now be triggered to reload using the
sys/plugins/reload/backend
endpoint and providing either the plugin name or the mounts to reload. -
Self-Reloading Plugins: The plugin system will now attempt to reload a crashed or stopped plugin, once per request
The release includes additional new features, general improvements, and bug fixes. The Vault 0.8.1 changelog provides a full list of changes. As always, please test in an isolated environment before upgrading and follow Vault's Upgrade Guide.
A big thanks to our amazing community for their ideas, bug reports, and pull requests.
Sign up for the latest HashiCorp news
More blog posts like this one
![Why use Vault-backed dynamic credentials to secure HCP Terraform infrastructure?](/_next/image?url=https%3A%2F%2Fwww.datocms-assets.com%2F2885%2F1572286031-vault-terraform-background.png&w=1920&q=75)
Why use Vault-backed dynamic credentials to secure HCP Terraform infrastructure?
Learn how HCP Terraform and Terraform Enterprise users can use Vault-backed dynamic credentials to secure their infrastructure during provisioning better than the base-level dynamic provider credentials.
![Solving the data security challenge for AI builders](/_next/image?url=https%3A%2F%2Fwww.datocms-assets.com%2F2885%2F1714171278-blog-library-product-vault-black.jpg&w=3840&q=75)
Solving the data security challenge for AI builders
This demo highlights the potential risks of using contextual data with LLMs and demonstrates how HashiCorp Vault can integrate with Pinecone to tackle AI data security challenges.
![PKI certificate metadata in Vault](/_next/image?url=https%3A%2F%2Fwww.datocms-assets.com%2F2885%2F1695238878-vault-keys-pki-imagery.png&w=3840&q=75)
PKI certificate metadata in Vault
Creating and using custom metadata helps you better manage and scale your PKI certificates with HashiCorp Vault.