HashiCorp Vault v0.6.5
We are pleased to announce the release of Vault v0.6.5. This release includes several new features, improvements, and bug fixes.
Vault v0.6.5 includes a number of exciting new features and improvements:
-
Transit in the Vault Enterprise UI - The Enterprise UI now fully supports Vault's
transit
backend. -
Okta and RADIUS authentication - You can now use Okta and RADIUS as authentication mechanisms to get Vault tokens.
-
Exportable Transit Keys - You can now select, at key creation time, whether a key can be exported. This cannot be changed after key creation.
-
Batch operations in Transit - You can now give the transit backend a set of inputs to encrypt/decrypt/rewrap in batch, reducing the number of HTTP calls that need to be made for large jobs.
-
Configurable Audited HTTP Headers - Vault can be configured to put specific HTTP request headers into audit log entries; these can optionally be HMAC'd.
In addition to these new features, there are a ton of bug fixes and tiny improvements. Please review the v0.6.5 changelog for a detailed list of changes.
A special thank you to our community members who have been invaluable in adding new features, reporting bugs, and improving the documentation for Vault.
Sign up for the latest HashiCorp news
More blog posts like this one

HashiCorp at Microsoft Build 2025: New products to automate, secure, and scale on Azure
Learn about the latest news from the HashiCorp and Microsoft ecosystems as we kick off Microsoft Build 2025 this week.

Why adopt HCP Vault Radar
HCP Vault Radar, enables teams to move from reactive firefighting to proactive secret remediation and management.

The 18-point secrets management checklist
How you handle secrets should evolve as your cloud journey progresses. Follow this best-practices checklist as a guide.