HashiCorp Vault v0.6.5
We are pleased to announce the release of Vault v0.6.5. This release includes several new features, improvements, and bug fixes.
Vault v0.6.5 includes a number of exciting new features and improvements:
-
Transit in the Vault Enterprise UI - The Enterprise UI now fully supports Vault's
transit
backend. -
Okta and RADIUS authentication - You can now use Okta and RADIUS as authentication mechanisms to get Vault tokens.
-
Exportable Transit Keys - You can now select, at key creation time, whether a key can be exported. This cannot be changed after key creation.
-
Batch operations in Transit - You can now give the transit backend a set of inputs to encrypt/decrypt/rewrap in batch, reducing the number of HTTP calls that need to be made for large jobs.
-
Configurable Audited HTTP Headers - Vault can be configured to put specific HTTP request headers into audit log entries; these can optionally be HMAC'd.
In addition to these new features, there are a ton of bug fixes and tiny improvements. Please review the v0.6.5 changelog for a detailed list of changes.
A special thank you to our community members who have been invaluable in adding new features, reporting bugs, and improving the documentation for Vault.
Sign up for the latest HashiCorp news
More blog posts like this one

Streamlining cryptographic key management with HashiCorp Vault
Learn when to use Vault’s 3rd party key management feature vs. the key management secrets engine for managing the lifecycle of keys in external key management systems.

Prioritizing data for post-quantum cryptography (PQC)
Prioritize and protect your most sensitive data from quantum threats with a smart, scalable cryptography strategy.

Streaming HCP Vault audit logs to Amazon CloudWatch for secure, real-time visibility
Learn how to automatically stream HCP Vault Dedicated audit logs into Amazon CloudWatch for real-time monitoring and compliance.