HashiCorp Vault v0.6.5
We are pleased to announce the release of Vault v0.6.5. This release includes several new features, improvements, and bug fixes.
Vault v0.6.5 includes a number of exciting new features and improvements:
-
Transit in the Vault Enterprise UI - The Enterprise UI now fully supports Vault's
transit
backend. -
Okta and RADIUS authentication - You can now use Okta and RADIUS as authentication mechanisms to get Vault tokens.
-
Exportable Transit Keys - You can now select, at key creation time, whether a key can be exported. This cannot be changed after key creation.
-
Batch operations in Transit - You can now give the transit backend a set of inputs to encrypt/decrypt/rewrap in batch, reducing the number of HTTP calls that need to be made for large jobs.
-
Configurable Audited HTTP Headers - Vault can be configured to put specific HTTP request headers into audit log entries; these can optionally be HMAC'd.
In addition to these new features, there are a ton of bug fixes and tiny improvements. Please review the v0.6.5 changelog for a detailed list of changes.
A special thank you to our community members who have been invaluable in adding new features, reporting bugs, and improving the documentation for Vault.
Sign up for the latest HashiCorp news
More blog posts like this one

Terraform provider for Google Cloud 7.0 is now GA
Version 7.0 of the HashiCorp Terraform Google Cloud provider adds new ephemeral resources, write-only attributes, and validation logic.

How to enable developer self-service at scale with Terraform and Waypoint
Learn how to simplify Terraform self-service with HCP Waypoint’s features for building golden deployment workflows.

Terraform now supports assigning agent pools at the project level
HCP Terraform and Terraform Enterprise users can now assign default agent pools at the project level, offering a more scalable and secure approach to agent pool configuration.