Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
179 commits
Select commit Hold shift + click to select a range
f03f92c
Create 1.21 docset
schavis Jul 22, 2025
afc7a91
Sync to 'main' of github.com:hashicorp/web-unified-docs into vault/1.…
schavis Jul 22, 2025
c2c16fb
Merge branch 'main' into vault/1.21.x
schavis Jul 25, 2025
1883b2d
2025-07-25.1358: Syncing to main
schavis Jul 25, 2025
7f3d023
2025-07-30.1241: Syncing to main
schavis Jul 30, 2025
4ce153d
Rename 1.21 folder to mark it as an rc docset
schavis Aug 1, 2025
7a9cc09
2025-07-31.1715: Syncing to main
schavis Aug 1, 2025
cb3f8dc
Add documentation for new secret list parameter
Shaeli Jul 30, 2025
ca8c466
Apply suggestion from @schavis
Shaeli Aug 4, 2025
1d9dc46
Apply suggestion from @schavis
Shaeli Aug 4, 2025
2389881
2025-08-04.1557: Syncing to main
schavis Aug 4, 2025
cbab0d5
add role count product usage metrics
elliesterner Aug 5, 2025
e166c1b
Add role count product usage metrics (#683)
elliesterner Aug 5, 2025
15cdbde
2025-08-05.1417: Syncing to main
schavis Aug 5, 2025
6f50205
2025-08-05.2023: Syncing to main
schavis Aug 6, 2025
cb1a3ea
2025-08-06.1107: Syncing to main
schavis Aug 6, 2025
8a8bfa2
docs for client first used time
akshya96 Aug 6, 2025
5549210
add note about timestamp
akshya96 Aug 6, 2025
6db7f08
remove quote
akshya96 Aug 6, 2025
3198c0e
Add api-docs field description and docs feature explanation
robmonte Aug 7, 2025
704966f
change description for token creation time
akshya96 Aug 7, 2025
8e7c39c
Add documentation for new vault secret list parameter (#655)
schavis Aug 7, 2025
691d03c
Update content/vault/v1.21.x (rc)/content/docs/sync/github.mdx
robmonte Aug 7, 2025
37df3e5
Update content/vault/v1.21.x (rc)/content/api-docs/system/internal-co…
akshya96 Aug 7, 2025
9762e8d
Update content/vault/v1.21.x (rc)/content/api-docs/system/internal-co…
akshya96 Aug 7, 2025
33a3981
2025-08-07.1348: Syncing to main
schavis Aug 7, 2025
57a0ef0
addressing comments
akshya96 Aug 7, 2025
4325da9
Add docs and api-docs for github enterprise url parameter for secrets…
robmonte Aug 7, 2025
cd67a5b
Vault Export api changes to add first used timestamp column in query …
akshya96 Aug 7, 2025
d682fa0
2025-08-13.1312: Syncing to main
schavis Aug 13, 2025
cbb1503
2025-08-14.1143: Syncing to main
schavis Aug 14, 2025
523891c
2025-08-15.1455: Syncing to main
schavis Aug 15, 2025
5af6846
add docs for AES-CBC
rculpepper Jul 28, 2025
8c446ae
add api docs for derivedkeys
rculpepper Aug 19, 2025
2471c7c
2025-08-20.1123: Syncing to main
schavis Aug 20, 2025
d44829d
Add field documentation and info
robmonte Aug 22, 2025
71d256c
Fix LDAP docs referencing Azure by mistake
robmonte Aug 22, 2025
e594c34
Add reference
robmonte Aug 22, 2025
81f9597
Add more info about setting up CMEK for GCP sync
robmonte Aug 22, 2025
5737ffa
Update ldap.mdx
robmonte Aug 22, 2025
fdb7e9b
Add section to api docs on batch-fetch certificates.
kitography Aug 25, 2025
a6a566e
2025-08-26.1518: Syncing to main
schavis Aug 26, 2025
1de2e54
Update content/vault/v1.21.x (rc)/content/api-docs/secret/transit.mdx
rculpepper Aug 26, 2025
f61572d
VAULT-37634, VAULT-36946: Census metrics for recover capability and a…
miagilepner Aug 28, 2025
51c9239
VAULT-37633: Database static role recover (#884)
miagilepner Sep 1, 2025
dc19bd1
VAULT-38654: Docs for autoloading snapshots (#890)
miagilepner Sep 2, 2025
983525e
VAULT-38653: Recover as a copy, and update to use headers (#892)
miagilepner Sep 2, 2025
64961e6
Update content/vault/v1.21.x (rc)/content/docs/auth/ldap.mdx
robmonte Sep 2, 2025
0bf7aca
Apply suggestions from code review
robmonte Sep 3, 2025
107b273
Update gcpsm.mdx
robmonte Sep 3, 2025
32896de
Add LDAP auth rotation_url docs (#854)
robmonte Sep 4, 2025
76f810e
Update 1.20 docs too
robmonte Sep 4, 2025
20f727d
Document setting up customer-managed encryption keys better for GCP s…
robmonte Sep 4, 2025
cb088e0
Add docs & api-docs for Azure Secrets Static Roles
Zlaticanin Sep 4, 2025
c4295f0
2025-09-05.1113: Syncing to main
schavis Sep 5, 2025
b5a53be
Update content/vault/v1.21.x (rc)/content/api-docs/secret/azure.mdx
Zlaticanin Sep 5, 2025
3fceb6a
Update content/vault/v1.21.x (rc)/content/api-docs/secret/azure.mdx
Zlaticanin Sep 5, 2025
4b3ddd7
Update content/vault/v1.21.x (rc)/content/api-docs/secret/azure.mdx
Zlaticanin Sep 5, 2025
2d7957a
Update content/vault/v1.21.x (rc)/content/api-docs/secret/azure.mdx
Zlaticanin Sep 5, 2025
5e80abe
Update content/vault/v1.21.x (rc)/content/api-docs/secret/azure.mdx
Zlaticanin Sep 5, 2025
ab4b523
Update content/vault/v1.21.x (rc)/content/api-docs/secret/azure.mdx
Zlaticanin Sep 5, 2025
51da57c
Update content/vault/v1.21.x (rc)/content/api-docs/secret/azure.mdx
Zlaticanin Sep 5, 2025
36b732d
Update content/vault/v1.21.x (rc)/content/api-docs/secret/azure.mdx
Zlaticanin Sep 5, 2025
f564c5a
Update content/vault/v1.21.x (rc)/content/api-docs/secret/azure.mdx
Zlaticanin Sep 5, 2025
a4a4bf6
Update content/vault/v1.21.x (rc)/content/api-docs/secret/azure.mdx
Zlaticanin Sep 5, 2025
dfa716d
Update content/vault/v1.21.x (rc)/content/api-docs/secret/azure.mdx
Zlaticanin Sep 5, 2025
39c43e1
Update content/vault/v1.21.x (rc)/content/api-docs/secret/azure.mdx
Zlaticanin Sep 5, 2025
f28ad31
Update content/vault/v1.21.x (rc)/content/api-docs/secret/azure.mdx
Zlaticanin Sep 5, 2025
249059a
Update content/vault/v1.21.x (rc)/content/api-docs/secret/azure.mdx
Zlaticanin Sep 5, 2025
f801728
Update content/vault/v1.21.x (rc)/content/docs/secrets/azure.mdx
Zlaticanin Sep 5, 2025
d06c607
Update content/vault/v1.21.x (rc)/content/docs/secrets/azure.mdx
Zlaticanin Sep 5, 2025
34743b7
Update content/vault/v1.21.x (rc)/content/docs/secrets/azure.mdx
Zlaticanin Sep 5, 2025
b4e718f
Update content/vault/v1.21.x (rc)/content/api-docs/secret/azure.mdx
Zlaticanin Sep 5, 2025
f48ae4b
Update content/vault/v1.21.x (rc)/content/api-docs/secret/azure.mdx
Zlaticanin Sep 5, 2025
a9176c2
update cred endpoint desc
Zlaticanin Sep 5, 2025
fc90e5b
Merge branch 'vault/1.21.x' into Zlaticanin/Azure-Secrets-static-roles
Zlaticanin Sep 5, 2025
131389a
fix wording
Zlaticanin Sep 5, 2025
cdae36b
2025-09-08.1133: Syncing to main
schavis Sep 8, 2025
71b907a
VAULT-37037 docs for Vault proxy update (#923)
VioletHynes Sep 8, 2025
d5fe460
Add docs for AES-CBC (#832)
rculpepper Sep 9, 2025
c097d6d
2025-09-09.1732: Syncing to main
schavis Sep 10, 2025
22e335d
Update content/vault/v1.21.x (rc)/content/api-docs/secret/azure.mdx
Zlaticanin Sep 10, 2025
5cd841a
Add note about 4 hour session default
robmonte Sep 10, 2025
a5f1fbc
Apply suggestion
robmonte Sep 11, 2025
3ebd17f
Mention 4 hour default session timeout for snowflake in 1.21.x (#938)
robmonte Sep 11, 2025
b6a41c3
Add docs & api-docs for Azure Secrets Static Roles (#908)
Zlaticanin Sep 12, 2025
a7b5e8d
Update content/vault/v1.21.x (rc)/content/api-docs/secret/pki/index.mdx
kitography Sep 15, 2025
976a647
Apply suggestions from code review
rculpepper Sep 16, 2025
afd9644
Add docs for KV v2 Version Attribution
mpalmi Sep 17, 2025
eb74d8b
fixup! Add docs for KV v2 Version Attribution
mpalmi Sep 17, 2025
c4bf98f
fixup! Add docs for KV v2 Version Attribution
mpalmi Sep 17, 2025
ab5217c
Add docs for KV v2 version attribution (#961)
mpalmi Sep 17, 2025
4b51ba6
Get rid of erroneous reference to kvv2 recover
mpalmi Sep 19, 2025
acd0487
2025-09-19.1517: Syncing to main
schavis Sep 19, 2025
4754ffd
Get rid of reference to kvv2 recover (#968)
mpalmi Sep 19, 2025
0c5d1e4
add metadata field
jaireddjawed Sep 22, 2025
e1ad5dd
Add section to api docs on batch-fetch certificates. (#860)
kitography Sep 22, 2025
954487e
Add new import params to Azure docs
Zlaticanin Sep 22, 2025
d863f13
update doc details
jaireddjawed Sep 23, 2025
927b887
Merge branch 'vault/1.21.x' into VAULT-39486-add-metadata-field
jaireddjawed Sep 23, 2025
a1f410e
Add metadata field for Vault Static Roles (#975)
jaireddjawed Sep 23, 2025
c39e6e1
add approved documentation to 1.21 branch
vinay-gopalan Sep 23, 2025
d2e5931
db/snowflake: clarify `connection_url` format when using keypair auth…
vinay-gopalan Sep 23, 2025
a136cf1
Merge branch 'vault/1.21.x' into VAULT-39489/add-new-Azure-import-params
Zlaticanin Sep 23, 2025
8b26c00
updated with suggestions
Zlaticanin Sep 23, 2025
2c6337e
[VAULT-39627] Add GUI steps for Secret Engine mount tune.
beagins Sep 24, 2025
6cdcad3
2025-09-24.1206: Syncing to main
schavis Sep 24, 2025
ef2eacc
Copilot adjustments for keeping this section clear and concise.
beagins Sep 24, 2025
9ea1d9b
2025-09-24.1854: Syncing to main
schavis Sep 25, 2025
5541a28
Add new Azure import params (#979)
Zlaticanin Sep 25, 2025
1c3e26e
Prep update docs for 1.21
schavis Sep 25, 2025
553a4b7
Merge branch 'vault/1.21.x' of github.com:hashicorp/web-unified-docs …
schavis Sep 25, 2025
cbb34a1
Add missing version table
schavis Sep 25, 2025
237db26
address PR comments
beagins Sep 25, 2025
9ccad24
address PR comment
beagins Sep 25, 2025
b000076
Add SPIFFE auth plugin docs
stevendpclark Sep 25, 2025
b557230
2025-09-25.1221: Syncing to main
schavis Sep 25, 2025
9e09147
Add docs for new datakeys endpoint (#843)
rculpepper Sep 25, 2025
98fa56a
address PR comments
beagins Sep 26, 2025
1d6083a
[VAULT-39627] Add GUI steps for Secret Engine mount tune (#995)
beagins Sep 26, 2025
d22262c
Merge branch 'vault/1.21.x' into stevendpclark_vault-38002_spiffe-docs
stevendpclark Sep 30, 2025
33566cb
Merge branch 'vault/1.21.x' into rculpepper/vault-39104
rculpepper Sep 30, 2025
126ac50
add note to MFA support in Vault
hellobontempo Oct 2, 2025
bc371e2
use active voice
hellobontempo Oct 2, 2025
5c915be
add docs to Setup login MFA
hellobontempo Oct 2, 2025
be901c5
fix typos
hellobontempo Oct 2, 2025
b557489
make subsections bold and add "Option" text
hellobontempo Oct 2, 2025
0443cd7
cumulative api docs
blueberry-pi Oct 3, 2025
c2b7850
2025-10-03.1051: Syncing to main
schavis Oct 3, 2025
03d0801
add missing partial
schavis Oct 3, 2025
019cc1e
Merge branch 'vault/1.21.x' into vault-38465-cumulative-api-docs
schavis Oct 3, 2025
e5cbfec
Correct partial paths for summary tables
schavis Oct 3, 2025
3d0d5bd
Merge branch 'vault/1.21.x' into vault-38465-cumulative-api-docs
schavis Oct 3, 2025
f63d9b1
Merge branch 'vault/1.21.x' into stevendpclark_vault-38002_spiffe-docs
stevendpclark Oct 6, 2025
3337370
Apply suggestions from code review
blueberry-pi Oct 6, 2025
8e03dce
Add API docs changes
kubawi Oct 6, 2025
09af78d
Tweak wording, add back warning
blueberry-pi Oct 6, 2025
89975e2
Add metrics docs changes
kubawi Oct 6, 2025
5f23213
Update content/vault/v1.21.x (rc)/content/api-docs/system/internal-co…
blueberry-pi Oct 6, 2025
aaa5487
add documentation for oracle
vinay-gopalan Oct 6, 2025
9f63e46
address PR feedback
hellobontempo Oct 6, 2025
a5a02e5
api docs feedback
hellobontempo Oct 6, 2025
5e62767
fix wording instead of just the typo
hellobontempo Oct 6, 2025
79de110
and for 1.21
hellobontempo Oct 6, 2025
171bbcf
increase section header
hellobontempo Oct 7, 2025
251d596
add TOTP support to login MFA types
hellobontempo Oct 7, 2025
efce7ba
create a partial alert for tech preview, add another sample request a…
blueberry-pi Oct 7, 2025
04c8826
Apply suggestions from code review
blueberry-pi Oct 7, 2025
77cedc6
Add missing important change info and remove empty release notes
schavis Oct 7, 2025
e9784b0
2025-10-06.2201: Syncing to main
schavis Oct 7, 2025
39e1b7b
Apply suggestions from code review
stevendpclark Oct 7, 2025
5c7da30
Update content/vault/v1.21.x (rc)/content/docs/auth/spiffe.mdx
stevendpclark Oct 7, 2025
5bf322f
Fix up docs post review
stevendpclark Oct 7, 2025
f96b054
Merge branch 'vault/1.21.x' into add-mfa-self-enroll-docs
hellobontempo Oct 7, 2025
5739e14
Merge branch 'vault/1.21.x' into rculpepper/vault-39104
rculpepper Oct 7, 2025
3ddc634
address comments
blueberry-pi Oct 7, 2025
471dd11
Add api docs for new derivedkeys endpoint (#844)
rculpepper Oct 7, 2025
ab8adb7
[VAULT] GA to RC sync 20251002 (#1052)
schavis Oct 7, 2025
475d88d
2025-10-07.1254: Syncing to main
schavis Oct 7, 2025
3a78db0
Apply suggestion from @hellobontempo
hellobontempo Oct 7, 2025
3f39d94
Update content/vault/v1.21.x (rc)/content/api-docs/auth/spiffe.mdx
stevendpclark Oct 7, 2025
fef1a3e
Merge branch 'vault/1.21.x' into vault-38465-cumulative-api-docs
blueberry-pi Oct 7, 2025
dd660f3
Update content/vault/v1.21.x (rc)/content/api-docs/auth/spiffe.mdx
stevendpclark Oct 7, 2025
b2767d3
Fix endpoint_url description within https_spiffe_bundle section in AP…
stevendpclark Oct 7, 2025
a5914e8
Add SPIFFE auth plugin docs (#1006)
stevendpclark Oct 7, 2025
54dc984
address feedback
vinay-gopalan Oct 7, 2025
41c96c0
Apply suggestion from @schavis
schavis Oct 7, 2025
770fce8
Add docs for Oracle Rootless Password Rotation for Vault 1.21 (#1063)
vinay-gopalan Oct 7, 2025
3a7e54f
2025-10-07.1546: Syncing to main
schavis Oct 7, 2025
cb80c3d
rename "parameters" to "path parameters"
hellobontempo Oct 7, 2025
a834555
clarify only one enforcement can be configured for web UI self-enroll
hellobontempo Oct 7, 2025
dd2fb41
1.21 - RC Add MFA TOTP Self-Enroll Docs (#1041)
hellobontempo Oct 7, 2025
9058679
[VAULT-38465] Cumulative API docs (#1050)
divyaac Oct 8, 2025
4ad00fd
update metadata docs
jaireddjawed Oct 8, 2025
3635805
Update Azure Static Roles Metadata Docs (#1073)
jaireddjawed Oct 8, 2025
a5e810c
2025-10-08.1027: Syncing to main
schavis Oct 8, 2025
325640e
Final pre-publication sync (#1076)
schavis Oct 8, 2025
396b8a5
Merge branch 'main' into vault/1.21.x
schavis Oct 9, 2025
ef1f5c7
Fix important changes pages
schavis Oct 9, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
Original file line number Diff line number Diff line change
Expand Up @@ -30,6 +30,6 @@ Found | Fixed | Workaround | Edition | Issue
1.20.0 | 1.20.1 | **Yes** | All | [GUI navigation error for KV v2 secret paths containing underscores](/vault/docs/v1.20.x/updates/important-changes#ui-kvv2-underscore-secrets)
1.18.4 | No | **Yes** | All | [Failing credential refresh for Snowflake DB secrets engine key pair authentication](/vault/docs/v1.20.x/updates/important-changes#snowflake-keypair-refresh)
1.20.0 | 1.20.1 | **Yes** | All | [Duplicate LDAP password rotations on standby node check-in](/vault/docs/v1.20.x/updates/important-changes#ldap-checkin)
1.19.0 | No | No | All | [Writing configuration to local auth mount (ldap, aws, gcp, azure) ignores local flag](/vault/docs/v1.20.x/updates/important-changes#local-auth-known-issue)
1.19.0 | No | **Yes** | Enterprise | [Missed events with multiple event clients](/vault/docs/v1.20.x/updates/important-changes#missed-events)
1.20.0 | No | No | All | [Writing configuration to local auth mount (ldap, aws, gcp, azure) ignores local flag](/vault/docs/v1.20.x/updates/important-changes#local-auth-known-issue)
1.20.0 | No | **Yes** | Enterprise | [Missed events with multiple event clients](/vault/docs/v1.20.x/updates/important-changes#missed-events)
1.20.0 | No | No | Enterprise | [Full seal rewraps occur on DR/PR failover with multi-seal enabled](/vault/docs/v1.20.x/updates/important-changes#multi-seal-rewrap)
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
### Breaking changes

Introduced | Recommendations | Edition | Change
---------- | --------------- | ---------- | ------
1.21.0 | **Yes** | All | [Audiences required for Kubernetes authentication roles](/vault/docs/v1.21.x/updates/important-changes#k8-audience-required)


### New behavior

None.

### Known issues

Found | Fixed | Workaround | Edition | Issue
------ |--------| ---------- | ---------- | -----
1.21.0 | No | **Yes** | Enterprise | [Missed events with multiple event clients](/vault/docs/v1.21.x/updates/important-changes#missed-events)
Original file line number Diff line number Diff line change
Expand Up @@ -254,7 +254,7 @@ $ vault write identity/mfa/method/totp \
digits=6
```

Using the TOTP `method_id` and an `entity_id` from after a sucessful MFA login. Use these to generate a QR code.
Vault generates an `entity_id` for users after a successful login. Use the TOTP `method_id` and the `entity_id` of the target user to generate a QR code.

```shell-session
$ vault write -field=barcode \
Expand Down
2 changes: 1 addition & 1 deletion content/vault/v1.19.x/content/docs/auth/ldap.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -230,7 +230,7 @@ of the root credential until the field is reset to `false`. If you use
`rotation_period`, setting `disable_automated_rotation` also resets the credential
TTL.

For more details on rotating root credentials in the Azure plugin, refer to the
For more details on rotating root credentials in the LDAP plugin, refer to the
[Root credential rotation](/vault/api-docs/auth/ldap#rotate-root) API docs.

@include 'rotation-manager-logging.mdx'
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -258,7 +258,7 @@ $ vault write identity/mfa/method/totp \
digits=6
```

Using the TOTP `method_id` and an `entity_id` from after a sucessful MFA login. Use these to generate a QR code.
Vault generates an `entity_id` for users after a successful login. Use the TOTP `method_id` and the `entity_id` of the target user to generate a QR code.

```shell-session
$ vault write -field=barcode \
Expand Down
2 changes: 1 addition & 1 deletion content/vault/v1.19.x/content/docs/secrets/ldap.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -155,7 +155,7 @@ of the root credential until the field is reset to `false`. If you use
`rotation_period`, setting `disable_automated_rotation` also resets the credential
TTL.

For more details on rotating root credentials in the Azure plugin, refer to the
For more details on rotating root credentials in the LDAP plugin, refer to the
[Root credential rotation](/vault/api-docs/secret/ldap#rotate-root) API docs.

@include 'rotation-manager-logging.mdx'
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -403,7 +403,7 @@ This endpoint creates a destination to synchronize secrets with the GCP Secret M
store replicated secrets. Note that secrets remain globally readable regardless of the selected locations.

- `locational_kms_keys` `(map<string|string>: nil)` - A map of location names to KMS key names to leverage customer-managed encryption keys for
encryption at rest. Each pair follows the format `location_name=encryption_key_resource_ID`. Refer to the
encryption at rest. Each pair follows the format `location_name=encryption_key_resource_name`. Refer to the
[sample payloads](#sample-payloads) for more details.

- `secret_name_template` `(string: "")` - Template to use when generating the secret names on the external system.
Expand Down
2 changes: 1 addition & 1 deletion content/vault/v1.20.x/content/docs/auth/ldap.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -240,7 +240,7 @@ of the root credential until the field is reset to `false`. If you use
`rotation_period`, setting `disable_automated_rotation` also resets the credential
TTL.

For more details on rotating root credentials in the Azure plugin, refer to the
For more details on rotating root credentials in the LDAP plugin, refer to the
[Root credential rotation](/vault/api-docs/auth/ldap#rotate-root) API docs.

@include 'rotation-manager-logging.mdx'
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -258,7 +258,7 @@ $ vault write identity/mfa/method/totp \
digits=6
```

Using the TOTP `method_id` and an `entity_id` from after a sucessful MFA login. Use these to generate a QR code.
Vault generates an `entity_id` for users after a successful login. Use the TOTP `method_id` and the `entity_id` of the target user to generate a QR code.

```shell-session
$ vault write -field=barcode \
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -169,9 +169,15 @@ All of these metrics are numerical, and contain no sensitive values or additiona
| `vault.secret.engine.activedirectory.count` | The total number of Active Directory secret engines in Vault. |
| `vault.secret.engine.alicloud.count` | The total number of Alicloud secret engines in Vault. |
| `vault.secret.engine.aws.count` | The total number of AWS secret engines in Vault. |
| `vault.secret.engine.aws.dynamic.role.count` | The total number of AWS dynamic roles in Vault. |
| `vault.secret.engine.aws.static.role.count` | The total number of AWS static roles in Vault. |
| `vault.secret.engine.azure.count` | The total number of Azure secret engines in Vault. |
| `vault.secret.engine.azure.dynamic.role.count` | The total number of Azure dynamic roles in Vault. |
| `vault.secret.engine.consul.count` | The total number of Consul secret engines in Vault. |
| `vault.secret.engine.gcp.count` | The total number of GCP secret engines in Vault. |
| `vault.secret.engine.gcp.impersonated.account.count` | The total number of GCP impersonated accounts in Vault. |
| `vault.secret.engine.gcp.roleset.count` | The total number of GCP rolesets in Vault. |
| `vault.secret.engine.gcp.static.role.count` | The total number of GCP static roles in Vault. |
| `vault.secret.engine.gcpkms.count` | The total number of GCPKMS secret engines in Vault. |
| `vault.secret.engine.kubernetes.count` | The total number of Kubernetes secret engines in Vault. |
| `vault.secret.engine.cassandra.count` | The total number of Cassandra secret engines in Vault. |
Expand All @@ -181,11 +187,15 @@ All of these metrics are numerical, and contain no sensitive values or additiona
| `vault.secret.engine.mongodb.count` | The total number of MongoDB secret engines in Vault. |
| `vault.secret.engine.mongodbatlas.count` | The total number of MongoDBAtlas secret engines in Vault. |
| `vault.secret.engine.mssql.count` | The total number of MSSql secret engines in Vault. |
| `vault.secret.engine.mysql.count` | The total number of MySQL secret engines in Vault. |
| `vault.secret.engine.mysql.count` | The total number of MySQL secret engines in Vault. |
| `vault.secret.engine.postgresql.count` | The total number of Postgresql secret engines in Vault. |
| `vault.secret.engine.nomad.count` | The total number of Nomad secret engines in Vault. |
| `vault.secret.engine.ldap.count` | The total number of LDAP secret engines in Vault. |
| `vault.secret.engine.ldap.dynamic.role.count` | The total number of LDAP dynamic roles in Vault. |
| `vault.secret.engine.ldap.static.role.count` | The total number of LDAP static roles in Vault. |
| `vault.secret.engine.openldap.count` | The total number of OpenLDAP secret engines in Vault. |
| `vault.secret.engine.openldap.dynamic.role.count` | The total number of OpenLDAP dynamic roles in Vault. |
| `vault.secret.engine.openldap.static.role.count` | The total number of OpenLDAP static roles in Vault. |
| `vault.secret.engine.pki.count` | The total number of PKI secret engines in Vault. |
| `vault.secret.engine.rabbitmq.count` | The total number of RabbitMQ secret engines in Vault. |
| `vault.secret.engine.ssh.count` | The total number of SSH secret engines in Vault. |
Expand All @@ -194,6 +204,8 @@ All of these metrics are numerical, and contain no sensitive values or additiona
| `vault.secret.engine.transform.count` | The total number of Transform secret engines in Vault. |
| `vault.secret.engine.transit.count` | The total number of Transit secret engines in Vault. |
| `vault.secret.engine.database.count` | The total number of Database secret engines in Vault. |
| `vault.secret.engine.database.dynamic.role.count` | The total number of Database dynamic roles in Vault. |
| `vault.secret.engine.database.static.role.count` | The total number of Database static roles in Vault. |
| `vault.secret.engine.plugin.count` | The total number of custom plugin secret engines in Vault. |
| `vault.secretsync.sources.count` | The total number of secret sources configured for secret sync. |
| `vault.secretsync.destinations.count` | The total number of secret destinations configured for secret sync. |
Expand Down
29 changes: 27 additions & 2 deletions content/vault/v1.20.x/content/docs/sync/gcpsm.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -95,7 +95,9 @@ Prerequisites:
```shell-session
$ vault write sys/sync/destinations/gcp-sm/my-dest/associations/set \
mount='my-kv' \
secret_name='my-secret'
secret_name='my-secret' \
replication_locations='us-east1' \
locational_kms_keys='us-east1=projects/my-project/locations/us-east1/keyRings/my-east-keyring/cryptoKeys/my-east-key'
```

**Output:**
Expand Down Expand Up @@ -137,7 +139,30 @@ corresponds with the planned replication policy. The key rings and keys must be

When using a global KMS key, it must be the only key set on the destination and the replication locations must remain unset, meaning
it can only be used with using GCP's automatic replication. When specifying regional keys, a key must be set for each region in the
replication location list. GCP key names are expected in the format of the entire resource ID, e.g. `projects/<project_id>/locations/<location_name>/keyRings/<key_ring_name>/cryptoKeys/<key_name>`. See the [API](#api) section for more details.
replication location list.

You must specify GCP key names using the entire resource name. For example,
`projects/<project_id>/locations/<location_name>/keyRings/<key_ring_name>/cryptoKeys/<key_name>`.
GCP key names, including the `keyRings` and `cryptoKeys` segments, are
case-sensitive.
Refer to the [Secrets sync API examples](/vault/api-docs/system/secrets-sync#sync-secrets-to-gcp-with-a-global-kms-key) for more details.

A service agent identity for the `secretsmanager` API must be created for GCP keys.
The correct IAM policy bindings must be granted to the service agents
with the `cloudkms.cryptoKeyEncrypterDecrypter` role. Be aware that you must
grant the CloudKMS role to the service agent for each key and its corresponding
replication location you want to use.

Refer to the [GCP documentation](https://cloud.google.com/secret-manager/docs/cmek)
for more details on setting up your GCP key resources.

<Warning title="CMEK silent failures">

Failure to establish the proper IAM policy bindings for all encryption keys and replication locations
typically causes GCP to silently ignore the customer-managed keys and fall back to Google-managed keys. Ensure you are using customer-managed encryption by validating the encryption type value on
the secrets from the gcloud CLI or the web console.

</Warning>

## Permissions

Expand Down
200 changes: 200 additions & 0 deletions content/vault/v1.21.x (rc)/content/api-docs/auth/alicloud.mdx
Original file line number Diff line number Diff line change
@@ -0,0 +1,200 @@
---
layout: api
page_title: AliCloud - Auth Methods - HTTP API
description: This is the API documentation for the Vault AliCloud auth method.
---

# AliCloud auth method (API)

This is the API documentation for the Vault AliCloud auth method. For
general information about the usage and operation of the AliCloud method, please
see the [Vault AliCloud auth method documentation](/vault/docs/auth/alicloud).

This documentation assumes the AliCloud auth method is mounted at the `/auth/alicloud`
path in Vault. Since it is possible to enable auth methods at any location,
please update your API calls accordingly.

## Create/Update role

Registers a role. Only entities using the role registered using this endpoint
will be able to perform the login operation.

| Method | Path |
| :----- | :-------------------------- |
| `POST` | `/auth/alicloud/role/:role` |

### Parameters

- `role` `(string: <required>)` - Name of the role. Must correspond with the name of the role reflected in the arn.
- `arn` `(string: <required>)` - The role's arn.

@include 'tokenfields.mdx'

### Sample payload

```json
{
"arn": "acs:ram::5138828231865461:role/dev-role",
"policies": ["dev", "prod"]
}
```

### Sample request

```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request POST \
--data @payload.json \
http://127.0.0.1:8200/v1/auth/alicloud/role/dev-role
```

## Read role

Returns the previously registered role configuration.

| Method | Path |
| :----- | :-------------------------- |
| `GET` | `/auth/alicloud/role/:role` |

### Parameters

- `role` `(string: <required>)` - Name of the role.

### Sample request

```shell-session
$ curl \
--header "X-Vault-Token: ..." \
http://127.0.0.1:8200/v1/auth/alicloud/role/dev-role
```

### Sample response

```json
{
"data": {
"arn": "acs:ram::5138828231865461:role/dev-role",
"policies": ["default", "dev", "prod"],
"ttl": 1800000,
"max_ttl": 1800000,
"period": 0
}
}
```

## List roles

Lists all the roles that are registered with the method.

| Method | Path |
| :----- | :--------------------- |
| `LIST` | `/auth/alicloud/roles` |

### Sample request

```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request LIST \
http://127.0.0.1:8200/v1/auth/alicloud/roles
```

### Sample response

```json
{
"data": {
"keys": ["dev-role", "prod-role"]
}
}
```

## Delete role

Deletes the previously registered role.

| Method | Path |
| :------- | :-------------------------- |
| `DELETE` | `/auth/alicloud/role/:role` |

### Parameters

- `role` `(string: <required>)` - Name of the role.

### Sample request

```shell-session
$ curl \
--header "X-Vault-Token: ..." \
--request DELETE \
http://127.0.0.1:8200/v1/auth/alicloud/role/dev-role
```

## Login

Fetch a token. This endpoint verifies the signature of the signed
GetCallerIdentity request.

| Method | Path |
| :----- | :--------------------- |
| `POST` | `/auth/alicloud/login` |

### Parameters

- `role` `(string: <required>)` - Name of the role.
- `identity_request_url` `(string: <required>)` - Base64-encoded HTTP URL used in
the signed request.
- `identity_request_headers` `(string: <required>)` - Base64-encoded,
JSON-serialized representation of the sts:GetCallerIdentity HTTP request
headers. The JSON serialization assumes that each header key maps to either a
string value or an array of string values (though the length of that array
will probably only be one).

### Sample payload

```json
{
"role": "dev-role",
"identity_request_url": "aWRlbnRpdHlabrVxdWVzdF91cmw=",
"identity_request_headers": "aWRlimRpdHlfcmVxdWVzdF9oZWFkZXJz"
}
```

### Sample request

```shell-session
$ curl \
--request POST \
--data @payload.json \
http://127.0.0.1:8200/v1/auth/alicloud/login
```

### Sample response

```json
{
"auth": {
"renewable": true,
"lease_duration": 1800000,
"metadata": {
"role_tag_max_ttl": "0",
"instance_id": "i-de0f1344",
"ami_id": "ami-fce36983",
"role": "dev-role",
"auth_type": "ec2",
"account_id": "5138828231865461",
"user_id": "216959339000654321",
"role_id": "4657-abcd",
"arn": "acs:ram::5138828231865461:assumed-role/dev-role/vm-ram-i-rj978rorvlg76urhqh7q",
"identity_type": "assumed-role",
"principal_id": "vm-ram-i-rj978rorvlg76urhqh7q",
"request_id": "D6E46F10-F26C-4AA0-BB69-FE2743D9AE62",
"role_name": "dev-role"
},
"policies": ["default", "dev"],
"accessor": "20b89871-e6f2-1160-fb29-31c2f6d4645e",
"client_token": "d9368254-3f21-aded-8a6f-7c818e81b17a"
}
}
```
Loading
Loading