Skip to main content

Overview

This document outlines the steps necessary to integrate the platform with HashiCorp Vault. Depending on the use case, you may need to configure the PKI secrets engine for certificate lifecycle management, the KV secrets engine for secret management, or both.

This integration guide was tested on:

  • Vault version 1.14.0+

HashiCorp Vault

HashiCorp Vault is a tool for securely accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, certificates, and more. Vault provides a unified interface to any secret, while providing tight access control and recording a detailed audit log.

The platform integrates with the following Vault secrets engines:

  • PKI secrets engine — generates dynamic X.509 certificates based on configured roles, signed by Vault's internal CA or an external CA
  • KV secrets engine — stores and manages arbitrary secrets as key-value pairs, with optional versioning (KV v2)
Vault installation

This guide assumes that you have already installed and configured HashiCorp Vault. If you haven't done so, refer to the HashiCorp Vault documentation for installation and configuration instructions.

For more information about the secrets engines, refer to the Vault PKI secrets engine documentation and the Vault KV secrets engine documentation.

Integration

Certificate Lifecycle Management (PKI)

The following steps are required to integrate HashiCorp Vault for certificate lifecycle management using the PKI secrets engine:

#ReferenceShort description
1Enable PKI Secrets EngineEnable and configure the PKI secrets engine
2Create PKI ACL PolicyCreate ACL policy with required permissions
3Enable Authentication MethodsEnable authentication methods that can be used

Secret Management (KV)

The following steps are required to integrate HashiCorp Vault for secret management using the KV secrets engine:

#ReferenceShort description
1Enable KV Secrets EngineEnable and configure the KV secrets engine (version 1 or version 2)
2Create KV ACL PolicyCreate ACL policy with required KV permissions
3Enable Authentication MethodsEnable authentication methods that can be used