[DOCS] SEO updates for docs under /enterprise (#29456)

* save progress

* SEO updates for docs under /enterprise
This commit is contained in:
Sarah Chavis
2025-01-29 17:47:51 -08:00
committed by GitHub
parent c090d31aaa
commit 39bce9fde3
44 changed files with 252 additions and 196 deletions

View File

@@ -1,11 +1,11 @@
---
layout: docs
page_title: Exclusion syntax for audit results
page_title: Exclusion syntax for audit data
description: >-
Learn about the behavior and syntax for excluding audit data in Vault Enterprise.
---
# Exclusion syntax for audit results
# Exclusion syntax for audit data
@include 'alerts/enterprise-only.mdx'

View File

@@ -1,11 +1,11 @@
---
layout: docs
page_title: Filter syntax for audit results
page_title: Filter syntax for audit data
description: >-
Learn about the behavior and syntax for filtering audit data in Vault Enterprise.
---
# Filter syntax for audit results
# Filter syntax for audit data
@include 'alerts/enterprise-only.mdx'

View File

@@ -1,13 +1,12 @@
---
layout: docs
page_title: Vault Enterprise Automated Integrated Storage Snapshots
description: |-
Vault Enterprise can be configured to take automated snapshots
when using raft Integrated Storage and store them locally or
in the cloud.
page_title: Automatic snapshots with integrated storage
description: >-
Configure Vault to take and store automated snapshots of backend storage when
using integrated storage.
---
# Automated integrated storage snapshots
# Automatic snapshots with integrated storage
@include 'alerts/enterprise-only.mdx'

View File

@@ -1,11 +1,11 @@
---
layout: docs
page_title: Vault Enterprise Automated Upgrades
description: |-
Vault Enterprise can upgrade itself automatically.
page_title: Automatically upgrade Vault clusters
description: >-
Use automated upgrades to simplify cluster upgrades.
---
# Automated upgrades
# Automatically upgrade Vault clusters
@include 'alerts/enterprise-only.mdx'

View File

@@ -1,30 +1,31 @@
---
layout: docs
page_title: Vault Enterprise Eventual Consistency
description: Vault Enterprise Consistency Model
page_title: Data consistency in Vault replication
description: >-
Learn how Vault establishes data consistency in replicated deployments.
---
# Vault eventual consistency
# Eventual consistency in Vault replication
@include 'alerts/enterprise-and-hcp.mdx'
When running in a cluster, Vault has an eventual consistency model.
Only one node (the leader) can write to Vault's storage.
Only one node (the leader) can write to backend storage.
Users generally expect read-after-write consistency: in other
words, after writing foo=1, a subsequent read of foo should return 1. Depending
on the Vault configuration this isn't always the case. When using performance
standbys with Integrated Storage, or when using performance replication,
standbys with integrated storage, or when using performance replication,
there are some sequences of operations that don't always yield read-after-write
consistency.
## Performance standby nodes
When using the Integrated Storage backend without performance standbys, only
When using the integrated storage backend without performance standbys, only
a single Vault node (the active node) handles requests. Requests sent to
regular standbys are handled by forwarding them to the active node. This Vault configuration
gives Vault the same behavior as the default Consul consistency model.
When using the Integrated Storage backend with performance standbys, both the
When using the integrated storage backend with performance standbys, both the
active node and performance standbys can handle requests. If a performance standby
handles a login request, or a request that generates a dynamic secret, the
performance standby will issue a remote procedure call (RPC) to the active node to store the token
@@ -32,7 +33,7 @@ and/or lease. If the performance standby handles any other request that
results in a storage write, it will forward that request to the active node
in the same way a regular standby forwards all requests.
With Integrated Storage, all writes occur on the active node, which then issues
With integrated storage, all writes occur on the active node, which then issues
RPCs to update the local storage on every other node. Between when the active
node writes the data to its local disk, and when those RPCs are handled on the
other nodes to write the data to their local disks, those nodes present a stale
@@ -56,7 +57,7 @@ it won't be visible on the secondary cluster until the data has been replicated
from the primary. Therefore, on the secondary cluster, it initially appears as if
the data write hasn't happened.
If the secondary cluster is using Integrated Storage, and the read request is
If the secondary cluster is using integrated storage, and the read request is
being handled on one of its performance standbys, the problem is exacerbated because it
has to be sent first from the primary active node to the secondary active node,
and then from there to the secondary performance standby, each of which can

View File

@@ -1,10 +1,12 @@
---
layout: docs
page_title: Vault Enterprise Control Groups
description: Vault Enterprise has support for Control Group Authorization.
page_title: Use control groups for authorization
description: >-
Use control group authorization to add authorization to existing
authentication request.
---
# Vault Enterprise control groups
# Use control groups for authorization
@include 'alerts/enterprise-and-hcp.mdx'

View File

@@ -1,12 +1,11 @@
---
layout: docs
page_title: Vault Enterprise Entropy Augmentation
description: |-
Vault Enterprise features a mechanism to sample entropy from external
cryptographic modules.
page_title: Augment entropy with external sampling
description: >-
Sample entropy from external cryptographic modules to augment Vault defaults.
---
# Entropy augmentation
# Augment entropy with external sampling
@include 'alerts/enterprise-only.mdx'

View File

@@ -1,12 +1,12 @@
---
layout: docs
page_title: Vault Enterprise FIPS 140-2 Inside
description: |-
Vault Enterprise features a special build with FIPS 140-2 support built into
the Vault binary. This can directly be used for FIPS compliance.
page_title: Built-in FIPS 140-2 support
description: >-
Learn about the FIPS build of Vault, which has FIPS 140-2 support built into
the Vault binary for FIPS compliance.
---
# FIPS 140-2 inside
# Built-in FIPS 140-2 support
@include 'alerts/enterprise-only.mdx'

View File

@@ -1,10 +1,11 @@
---
layout: docs
page_title: Vault Enterprise FIPS
description: An overview of FIPS compliance in Vault.
page_title: FIPS compliance in Vault
description: >-
Learn about FIPS compliance options in Vault.
---
# FIPS
# FIPS compliance in Vault
@include 'alerts/enterprise-only.mdx'

View File

@@ -1,10 +1,9 @@
---
layout: docs
page_title: Vault Enterprise FIPS Seal Wrap
description: |-
Vault Enterprise features a mechanism to wrap values with an extra layer of
encryption for supporting seals. This can be used for FIPS Compliance with
a certified HSM.
page_title: Seal wrap for FIPS compliance
description: >-
Learn how Vault Enterprise wraps values with an extra layer of encryption for
applicable seals for FIPS Compliance with a certified HSM.
---
# Seal wrap for FIPS compliance

View File

@@ -1,12 +1,12 @@
---
layout: docs
page_title: Behavioral Changes - HSM Integration - Vault Enterprise
page_title: How HSM support changes Vault behavioral
description: >-
Vault Enterprise HSM support changes the way Vault works with regard to unseal
and recovery keys as well as rekey and recovery operations.
Understand how HSM support changes the way Vault works with unseal/recovery
keys and rekey/recovery operations.
---
# Vault enterprise HSM behavioral changes
# How HSM support changes Vault behavioral
@include 'alerts/enterprise-only.mdx'

View File

@@ -1,12 +1,12 @@
---
layout: docs
page_title: HSM Integration - Vault Enterprise
page_title: Vault HSM support overview
description: >-
Vault Enterprise has HSM support, allowing for external root key storage and
Review how HSM support in Vault works with external root key storage and
automatic unsealing.
---
# Vault enterprise HSM support
# Vault HSM support overview
@include 'alerts/enterprise-only.mdx'

View File

@@ -1,10 +1,11 @@
---
layout: docs
page_title: Security Details - HSM Integration - Vault Enterprise
description: Recommendations to ensure the security of a Vault Enterprise HSM deployment.
page_title: HSM security details
description: >-
Understand how to ensure the security of a Vault Enterprise HSM deployment.
---
# Vault enterprise HSM security details
# HSM security details
@include 'alerts/enterprise-only.mdx'

View File

@@ -1,9 +1,9 @@
---
layout: docs
page_title: Vault Enterprise
description: |-
Vault Enterprise features a number of capabilities beyond the open
source offering that may be beneficial in certain workflows.
description: >-
Upgrade to Vault Enterprise to access enterprise-critical functionality not
available in the open source offering.
---
# Vault Enterprise

View File

@@ -1,11 +1,11 @@
---
layout: docs
page_title: Vault Enterprise Lease Count Quotas
description: |-
Vault Enterprise features a mechanism to create lease count quotas.
page_title: Enforce lease count quotas
description: >-
Configure Vault Enterprise to establish and enforce lease count quotas.
---
# Lease count quotas
# Enforce lease count quotas
@include 'alerts/enterprise-only.mdx'

View File

@@ -1,10 +1,11 @@
---
layout: docs
page_title: License Autoloading
description: An overview of license autoloading.
page_title: Autoload an enterprise license
description: >-
Learn how Vault automatically loads enterprise licenses.
---
# License autoloading
# Automatically load a Vault enterprise license
@include 'alerts/enterprise-only.mdx'

View File

@@ -1,10 +1,11 @@
---
layout: docs
page_title: Frequently Asked Questions (FAQ)
description: An overview of license.
page_title: Vault licensing FAQ
description: >-
Frequently asked questions about Vault Enterprise licensing.
---
# License FAQ
# Vault licensing FAQ
This FAQ section is for license changes and updates introduced for Vault Enterprise.
- [Q: How do the license termination changes affect upgrades?](#q-how-do-the-license-termination-changes-affect-upgrades)

View File

@@ -1,13 +1,45 @@
---
layout: docs
page_title: Vault Enterprise License
description: An overview of license.
page_title: Vault Enterprise licensing
description: >-
Find documentation related to Vault Enterprise licensing
---
# Vault license
# Vault Enterprise licensing
@include 'alerts/enterprise-only.mdx'
Licenses and EULA enhancements have been introduced in Vault 1.8 release. Please refer to the [FAQ](/vault/docs/enterprise/license/faq) for common questions concerning these changes.
Vault 1.8 introduced licenses and EULA enhancements that gate enterprise
features in Vault.
The [Install a HashiCorp Enterprise License](/vault/tutorials/enterprise/hashicorp-enterprise-license) tutorial provides the instruction to load your Vault license.
<Tabs>
<Tab heading="Guides">
- [Automatically load a Vault enterprise license](/vault/docs/enterprise/license/autoloading) -
Learn how Vault automatically loads enterprise licenses.
- [Automated license utilization reporting](/vault/docs/enterprise/license/autoloading) -
Learn about the data HashiCorp collects automatically to meter Enterprise
license utilization and how to enable or disable automated reporting
- [Manual license utilization reporting](/vault/docs/enterprise/license/manual-reporting) -
Learn how to manually export, review, and send license utilization data to
HashiCorp through the Vault CLI or HCP web portal.
- [Anonymous product usage reporting](/vault/docs/enterprise/license/product-usage-reporting) -
Learn about the anonymized data HashiCorp collects automatically for product
usage reporting and how to enable or disable data collection.
- [Vault licensing FAQ](/vault/docs/enterprise/license/faq)
</Tab>
<Tab heading="Tutorials">
- [Install a HashiCorp Enterprise License](/vault/tutorials/enterprise/hashicorp-enterprise-license) -
guided walkthrough for loading a Vault license.
</Tab>
</Tabs>

View File

@@ -2,7 +2,8 @@
layout: docs
page_title: Manual license utilization reporting
description: >-
Manual license utilization reporting allows you to export, review, and send license utilization data to HashiCorp through the CLI or HCP Web Portal.
Learn how to manually export, review, and send license utilization data to
HashiCorp through the Vault CLI or HCP web portal.
---
# Manual license utilization reporting
@@ -10,7 +11,8 @@ description: >-
@include 'alerts/enterprise-only.mdx'
Manual license utilization reporting allows you to export, review, and send
license utilization data to HashiCorp via the CLI or HCP Web Portal. Use these
license utilization data to HashiCorp via the CLI or
[HCP web portal](https://portal.cloud.hashicorp.com/). Use these
reports to understand how much more you can deploy under your current contract,
protect against overutilization, and budget for predicted consumption. Manual
reporting shares the minimum data required to validate license utilization as

View File

@@ -1,11 +1,12 @@
---
layout: docs
page_title: Product usage reporting
page_title: Anonymous product usage reporting
description: >-
Learn what anonymous usage data HashiCorp collects as part of Enterprise utilization reporting. Enable or disable collection.
Learn about the anonymized data HashiCorp collects automatically for product
usage reporting and how to enable or disable data collection.
---
# Product usage reporting
# Anonymous product usage reporting
@include 'alerts/enterprise-only.mdx'

View File

@@ -2,7 +2,8 @@
layout: docs
page_title: Automated license utilization reporting
description: >-
Learn what data HashiCorp collects to meter Enterprise license utilization. Enable or disable reporting. Review sample payloads and logs.
Learn about the data HashiCorp collects automatically to meter Enterprise
license utilization and how to enable or disable automated reporting.
---
# Automated license utilization reporting

View File

@@ -1,11 +1,11 @@
---
layout: docs
page_title: Managed Keys
page_title: Use 3rd party key management
description: >-
Managed Keys is a system in Vault that defers all private key operations to a third party system.
Configure Vault to defer private key operations to a third party system.
---
# Managed keys
# Use 3rd party key management for private keys
@include 'alerts/enterprise-and-hcp.mdx'

View File

@@ -1,12 +1,11 @@
---
layout: docs
page_title: MFA Support - Vault Enterprise
page_title: MFA support in Vault
description: >-
Vault Enterprise has support for Multi-factor Authentication (MFA), using
different authentication types.
Learn about using multi-factor authentication (MFA) support with Vault.
---
# Vault enterprise MFA support
# Multi-factor authentication (MFA) support in Vault
@include 'alerts/enterprise-only.mdx'

View File

@@ -1,10 +1,11 @@
---
layout: docs
page_title: Duo MFA - MFA Support - Vault Enterprise
description: Vault Enterprise supports Duo MFA type.
page_title: Configure Duo for MFA
description: >-
Configure Vault to use Duo for multi-factor authentication.
---
# Duo MFA
# Configure Vault with Duo for MFA
@include 'alerts/enterprise-only.mdx'

View File

@@ -1,10 +1,11 @@
---
layout: docs
page_title: Okta MFA - MFA Support - Vault Enterprise
description: Vault Enterprise supports Okta MFA type.
page_title: Configure Okta for MFA
description: >-
Configure Vault to use Okta for multi-factor authentication.
---
# Okta MFA
# Configure Vault with Okta for MFA
@include 'alerts/enterprise-only.mdx'

View File

@@ -1,10 +1,11 @@
---
layout: docs
page_title: PingID MFA - MFA Support - Vault Enterprise
description: Vault Enterprise supports PingID MFA type.
page_title: Configure PingID for MFA
description: >-
Configure Vault to use PingID for multi-factor authentication.
---
# PingID MFA
# Configure Vault with PingID for MFA
@include 'alerts/enterprise-only.mdx'

View File

@@ -1,10 +1,12 @@
---
layout: docs
page_title: TOTP MFA - MFA Support - Vault Enterprise
description: Vault Enterprise supports TOTP MFA type.
page_title: Configure TOTP for MFA
description: >-
Configure Vault to use a time-based, one-time password (TOTP) for multi-factor
authentication.
---
# TOTP MFA
# Configure Vault with time-based, one-time passwords (TOTP) for MFA
@include 'alerts/enterprise-only.mdx'

View File

@@ -1,11 +1,11 @@
---
layout: docs
page_title: Configure cross namespace access without hierarchical relationships
page_title: Configure cross namespace access
description: >-
Set up cross namespace access without hierarchical relationships for Vault Enterprise.
Set up cross namespace access in Vault without using hierarchical relationships.
---
# Configure cross namespace access
# Configure cross namespace access in Vault
Using the `sys/config/group_policy_application` endpoint, you can enable secrets sharing
across multiple independent namespaces.

View File

@@ -2,11 +2,12 @@
layout: docs
page_title: Configure an administrative namespace
description: >-
Step-by-step guide for setting up an administrative namespace with Vault
Enterprise
Step-by-step guide for setting up an administrative namespace in Vault
---
# Create an administrative namespace <EnterpriseAlert product=vault inline=true />
# Create an administrative namespace
@include 'alerts/enterprise-only.mdx'
Grant access to a predefined subset of privileged system backend endpoints in
the Vault API with an administrative namespace.

View File

@@ -1,12 +1,13 @@
---
layout: docs
page_title: Namespaces - Vault Enterprise
page_title: Namespace and SMT support in Vault
description: >-
Vault Enterprise has support for Namespaces, a feature to enable Secure
Multi-tenancy (SMT) and self-management.
Learn about namespaces and secure multi-tenancy (SMT) support in Vault.
---
# Vault Enterprise namespaces <EnterpriseAlert product=vault inline=true />
# Namespace and secure multi-tenancy (SMT) support in Vault
@include 'alerts/enterprise-and-hcp.mdx'
Many organizations implement Vault as a service to provide centralized
management of sensitive data and ensure that the different teams in an

View File

@@ -1,11 +1,13 @@
---
layout: docs
page_title: Run Vault Enterprise with many namespaces
page_title: Run Vault with many namespaces
description: >-
Guidance for using thousands of namespaces with Vault Enterprise
Guidance for using thousands of namespaces with Vault
---
# Run Vault Enterprise with many namespaces
# Run Vault with many namespaces
@include 'alerts/enterprise-and-hcp.mdx'
Use namespaces to create isolated environments within Vault Enterprise.
By default, Vault limits the number and depth of namespaces based on your

View File

@@ -1,11 +1,12 @@
---
layout: docs
page_title: Namespace and mount structure guide
page_title: Best practices for namespaces and mount paths
description: >-
Explains HashiCorp's recommended approach to structuring the Vault namespaces, and how namespaces impact on the endpoint paths.
Review best practices for structuring Vault namespaces and learn how
namespaces impact endpoint paths.
---
# Namespace and mount structure guide
# Best practices for namespaces and mount paths
Namespaces are isolated environments that functionally create "Vaults within a
Vault." They have separate login paths, and support creating and managing data

View File

@@ -1,10 +1,12 @@
---
layout: docs
page_title: Performance Standby Nodes - Vault Enterprise
description: Performance Standby Nodes - Vault Enterprise
page_title: Use performance standby nodes
description: >-
Use performance standby nodes with Vault Enterprise clusters for high
availability.
---
# Performance standby nodes
# Use performance standby nodes
@include 'alerts/enterprise-and-hcp.mdx'

View File

@@ -1,11 +1,12 @@
---
layout: docs
page_title: AWS KMS External Key Store (XKS) - PKCS#11 Provider - Vault Enterprise
description: |-
AWS KMS External Key Store can use Vault as a key store via the Vault PKCS#11 Provider.
page_title: Configure PKCS#11 with AWS KMS XKS
description: >-
Use the Vault PKCS#11 provider with AWS KMS External Key Store (XKS) to store
and manage cryptographic keys.
---
# Vault with AWS KMS external key store (XKS) via PKCS#11 and XKS proxy
# Configure PKCS#11 with AWS KMS external key store (XKS)
@include 'alerts/enterprise-only.mdx'

View File

@@ -1,18 +1,17 @@
---
layout: docs
page_title: PKCS#11 Provider - Vault Enterprise
description: |-
The Vault PKCS#11 Provider allows Vault KMIP Secrets Engine to be used via PKCS#11 calls.
The provider supports a subset of key generation, encryption, decryption and key storage operations.
This requires the Enterprise ADP-KM license.
page_title: PKCS#11 support in Vault
description: >-
Use the PKCS#11 provider to support KMIP secrets with PKCS#11 calls.
---
# PKCS#11 provider
# PKCS#11 support in Vault
@include 'alerts/enterprise-only.mdx'
PKCS11 provider is part of the [KMIP Secret Engine](/vault/docs/secrets/kmip), which requires [Vault Enterprise](https://www.hashicorp.com/products/vault/pricing)
with the Advanced Data Protection (ADP) module.
with the Advanced Data Protection (ADP) module. The PKCS11 provider supports a subset of key generation, encryption, decryption and key storage operations.
You must have an Enterprise ADP-KM license to use the PKCS11 provider.
[PKCS#11](http://docs.oasis-open.org/pkcs11/pkcs11-base/v2.40/os/pkcs11-base-v2.40-os.html)
is an open standard C API that provides a means to access cryptographic capabilities on a device.

View File

@@ -1,11 +1,12 @@
---
layout: docs
page_title: Oracle TDE - PKCS#11 Provider - Vault Enterprise
description: |-
The Vault PKCS#11 Provider can be used to enable Oracle TDE.
page_title: Configure PKCS#11 with Oracle TDE
description: >-
Use the Vault PKCS#11 provider with Oracle Transparent Data Encryption (TDE)
to store and manage cryptographic keys.
---
# Oracle TDE
# Configure PKCS#11 with Oracle TDE
@include 'alerts/enterprise-only.mdx'

View File

@@ -1,15 +1,16 @@
---
layout: docs
page_title: Vault Enterprise Redundancy Zones
description: |-
Vault Enterprise clusters can have hot standby nodes for scalability and resiliency.
page_title: Use redundancy zones
description: >-
Use redundancy zones with hot standby nodes for improved scalability and
resiliency with Vault Enterprise clusters.
---
# Redundancy zones
# Use redundancy zones
@include 'alerts/enterprise-only.mdx'
Vault Enterprise Redundancy Zones provide both read scaling and resiliency benefits by enabling
Vault Enterprise redundancy zones provide both read scaling and resiliency benefits by enabling
the deployment of non-voting nodes alongside voting nodes on a per availability zone basis.
When using redundancy zones, if an operator chooses to deploy Vault across three availability zones,

View File

@@ -2,7 +2,8 @@
layout: docs
page_title: Check for Merkle tree corruption
description: >-
Learn how to check your Vault Enterprise cluster data for corruption in the Merkle trees used for replication.
Learn how to check Vault cluster data for corruption in the Merkle trees used
for replication.
---
# Check for Merkle tree corruption

View File

@@ -1,13 +1,12 @@
---
layout: docs
page_title: Replication - Vault Enterprise
page_title: Replication support in Vault
description: >-
Vault Enterprise has support for Replication, allowing critical data to be
replicated across clusters to support horizontally scaling and disaster
recovery workloads.
Learn how Vault replicates data across clusters to support horizontal scaling
and disaster recovery workloads.
---
# Vault Enterprise replication
# Replication support in Vault
@include 'alerts/enterprise-and-hcp.mdx'

View File

@@ -1,17 +1,17 @@
---
layout: docs
page_title: Vault Enterprise Seal Wrap
description: |-
Vault Enterprise features a mechanism to wrap values with an extra layer of
encryption for supporting seals.
page_title: Wrap seals with encryption
description: >-
Wrap sealed data with an extra layer of encryption to honor increased
compliance and regulatory requirements including FIPS 140-2.
---
# Seal wrap
# Wrap seals with encryption
@include 'alerts/enterprise-and-hcp.mdx'
Vault Enterprise features a mechanism to wrap values with an extra layer of
encryption for supporting [seals](/vault/docs/configuration/seal). This adds an
encryption for supported [seals](/vault/docs/configuration/seal). This adds an
extra layer of protection and is useful in some compliance and regulatory
environments, including FIPS 140-2 environments.

View File

@@ -1,7 +1,8 @@
---
layout: docs
page_title: Sentinel Examples
description: An overview of how Sentinel interacts with Vault Enterprise.
page_title: Sentinel examples
description: >-
Examples for managing Vault policies with Sentinel.
---
# Examples

View File

@@ -1,10 +1,11 @@
---
layout: docs
page_title: Vault Enterprise Sentinel Integration
description: An overview of how Sentinel interacts with Vault Enterprise.
page_title: Mange Vault policies with Sentinel
description: >-
Mange Vault policies programmatically with Sentinel.
---
# Vault Enterprise and Sentinel integration
# Mange Vault policies with Sentinel
@include 'alerts/enterprise-and-hcp.mdx'

View File

@@ -1,10 +1,11 @@
---
layout: docs
page_title: Sentinel Properties
description: An overview of how Sentinel interacts with Vault Enterprise.
page_title: Sentinel properties for Vault
description: >-
An overview of Sentinel properties relevant to managing Vault policies.
---
# Properties
# Sentinel properties for Vault
@include 'alerts/enterprise-and-hcp.mdx'

View File

@@ -2926,14 +2926,14 @@
"path": "enterprise"
},
{
"title": "License",
"title": "Licensing",
"routes": [
{
"title": "Overview",
"path": "enterprise/license"
},
{
"title": "Autoloading",
"title": "Autoload an enterprise license",
"path": "enterprise/license/autoloading"
},
{
@@ -2945,7 +2945,7 @@
"path": "enterprise/license/manual-reporting"
},
{
"title": "Product usage reporting",
"title": "Anonymous product usage reporting",
"path": "enterprise/license/product-usage-reporting"
},
{
@@ -2966,7 +2966,7 @@
"title": "Replication",
"routes": [
{
"title": "Overview",
"title": "Replication support in Vault",
"path": "enterprise/replication"
},
{
@@ -2979,82 +2979,82 @@
"title": "HSM Support",
"routes": [
{
"title": "Overview",
"title": "HSM support overview",
"path": "enterprise/hsm"
},
{
"title": "Behavioral Changes",
"title": "How HSM changes Vault",
"path": "enterprise/hsm/behavior"
},
{
"title": "Security",
"title": "HSM security details",
"path": "enterprise/hsm/security"
}
]
},
{
"title": "PKCS11 Provider",
"title": "PKCS11 provider",
"routes": [
{
"title": "Overview",
"title": "PKCS#11 support in Vault",
"path": "enterprise/pkcs11-provider"
},
{
"title": "AWS KMS XKS",
"title": "Use PKCS#11 with AWS KMS",
"path": "enterprise/pkcs11-provider/aws-xks"
},
{
"title": "Oracle TDE",
"title": "Use PKCS#11 with Oracle TDE",
"path": "enterprise/pkcs11-provider/oracle-tde"
}
]
},
{
"title": "Automated Integrated Storage Snapshots",
"title": "Automatic snapshots with integrated storage",
"path": "enterprise/automated-integrated-storage-snapshots"
},
{
"title": "Automated Upgrades",
"title": "Automatically upgrade Vault clusters",
"path": "enterprise/automated-upgrades"
},
{
"title": "Redundancy Zones",
"title": "Use redundancy zones",
"path": "enterprise/redundancy-zones"
},
{
"title": "Lease Count Quotas",
"title": "Enforce lease count quotas",
"path": "enterprise/lease-count-quotas"
},
{
"title": "Entropy Augmentation",
"title": "Augment entropy with external samples",
"path": "enterprise/entropy-augmentation"
},
{
"title": "FIPS",
"routes": [
{
"title": "Overview",
"title": "FIPS compliance in Vault",
"path": "enterprise/fips"
},
{
"title": "FIPS 140-2 Inside Vault",
"title": "Built-in FIPS 140-2 support",
"path": "enterprise/fips/fips1402"
},
{
"title": "Seal Wrap for FIPS 140-2",
"title": "Seal wrap for FIPS compliance",
"path": "enterprise/fips/sealwrap"
}
]
},
{
"title": "Seal Wrap",
"title": "Wrap seals with encryption",
"path": "enterprise/sealwrap"
},
{
"title": "Namespaces",
"title": "Namespaces and SMT",
"routes": [
{
"title": "Overview",
"title": "Namespace + SMT support in Vault",
"path": "enterprise/namespaces"
},
{
@@ -3080,17 +3080,17 @@
}
},
{
"title": "Structure guide",
"title": "Best practices for namespaces",
"path": "enterprise/namespaces/namespace-structure"
}
]
},
{
"title": "Performance Standbys",
"title": "Use performance standby nodes",
"path": "enterprise/performance-standby"
},
{
"title": "Eventual Consistency",
"title": "Data consistency for replication",
"path": "enterprise/consistency"
},
{
@@ -3107,57 +3107,57 @@
]
},
{
"title": "Control Groups",
"title": "Use control group authZ ",
"path": "enterprise/control-groups"
},
{
"title": "Managed Keys",
"title": "3rd party key management",
"path": "enterprise/managed-keys"
},
{
"title": "MFA",
"title": "Multi-factor authN",
"routes": [
{
"title": "Overview",
"title": "MFA support in Vault",
"path": "enterprise/mfa"
},
{
"title": "Duo MFA",
"title": "Configure Duo for MFA",
"path": "enterprise/mfa/mfa-duo"
},
{
"title": "Okta MFA",
"title": "Configure Okta for MFA",
"path": "enterprise/mfa/mfa-okta"
},
{
"title": "PingID MFA",
"title": "Configure PingID for MFA",
"path": "enterprise/mfa/mfa-pingid"
},
{
"title": "TOTP MFA",
"title": "Configure TOTP for MFA",
"path": "enterprise/mfa/mfa-totp"
}
]
},
{
"title": "Sentinel",
"title": "Manage policies as code",
"routes": [
{
"title": "Overview",
"title": "Mange Vault policies with Sentinel",
"path": "enterprise/sentinel"
},
{
"title": "Examples",
"path": "enterprise/sentinel/examples"
"title": "Sentinel properties for Vault",
"path": "enterprise/sentinel/properties"
},
{
"title": "Properties",
"path": "enterprise/sentinel/properties"
"title": "Sentinel examples",
"path": "enterprise/sentinel/examples"
}
]
},
{
"title": "HCP Vault",
"title": "HCP Vault docs",
"href": "https://cloud.hashicorp.com/docs/vault"
}
]