HashiCorp Vault v0.6.5
We are pleased to announce the release of Vault v0.6.5. This release includes several new features, improvements, and bug fixes.
Vault v0.6.5 includes a number of exciting new features and improvements:
-
Transit in the Vault Enterprise UI - The Enterprise UI now fully supports Vault's
transit
backend. -
Okta and RADIUS authentication - You can now use Okta and RADIUS as authentication mechanisms to get Vault tokens.
-
Exportable Transit Keys - You can now select, at key creation time, whether a key can be exported. This cannot be changed after key creation.
-
Batch operations in Transit - You can now give the transit backend a set of inputs to encrypt/decrypt/rewrap in batch, reducing the number of HTTP calls that need to be made for large jobs.
-
Configurable Audited HTTP Headers - Vault can be configured to put specific HTTP request headers into audit log entries; these can optionally be HMAC'd.
In addition to these new features, there are a ton of bug fixes and tiny improvements. Please review the v0.6.5 changelog for a detailed list of changes.
A special thank you to our community members who have been invaluable in adding new features, reporting bugs, and improving the documentation for Vault.
Sign up for the latest HashiCorp news
More blog posts like this one

Improve secret scanning efficiency in HCP Vault Radar
Learn how HCP Vault Radar uses tuning detection with regex, ignore rules, and exclusion rules to detect leaks and unmanaged secrets.

HCP Vault Radar goes GA with Vault import
HCP Vault Radar, now GA, can copy and secure secrets discovered in Git-supported repositories and collaboration platforms directly into HashiCorp Vault.

47-day certificates lifespan mandate: How we can help
As new certificate management standards take effect, learn how Vault adoption can speed up your adoption and mitigate certificate-related risks.