We are pleased to announce the release of Vault v0.6.5. This release includes several new features, improvements, and bug fixes.
Vault v0.6.5 includes a number of exciting new features and improvements:
Transit in the Vault Enterprise UI - The Enterprise UI now fully supports Vault's transit
backend.
Okta and RADIUS authentication - You can now use Okta and RADIUS as authentication mechanisms to get Vault tokens.
Exportable Transit Keys - You can now select, at key creation time, whether a key can be exported. This cannot be changed after key creation.
Batch operations in Transit - You can now give the transit backend a set of inputs to encrypt/decrypt/rewrap in batch, reducing the number of HTTP calls that need to be made for large jobs.
Configurable Audited HTTP Headers - Vault can be configured to put specific HTTP request headers into audit log entries; these can optionally be HMAC'd.
In addition to these new features, there are a ton of bug fixes and tiny improvements. Please review the v0.6.5 changelog for a detailed list of changes.
A special thank you to our community members who have been invaluable in adding new features, reporting bugs, and improving the documentation for Vault.
Learn how to run a 3-node HashiCorp Vault cluster as a HashiCorp Nomad Job and automate the cluster initialization.
Learn how to deploy the underlying HashiCorp Nomad infrastructure and configuration to run HashiCorp Vault as a Nomad job.
Do cloud right with The Infrastructure Cloud from HashiCorp. Unlock developer potential while controlling cloud costs and risk.