mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-11-03 20:17:59 +00:00 
			
		
		
		
	docs: secrets-sync - move destination note (#26044)
This commit is contained in:
		@@ -129,6 +129,10 @@ The secret synced with the old granularity will be deleted and new secrets will
 | 
			
		||||
 | 
			
		||||
## Security
 | 
			
		||||
 | 
			
		||||
~> Note: Vault does not control the permissions at the destination. It is the responsibility
 | 
			
		||||
of the operator to configure and maintain proper access controls on the external system so synced
 | 
			
		||||
secrets are not accessed unintentionally.
 | 
			
		||||
 | 
			
		||||
### Vault access requirements
 | 
			
		||||
 | 
			
		||||
Vault verifies the client has read access on the secret before syncing it with any destination. This additional check is
 | 
			
		||||
@@ -193,9 +197,6 @@ Likewise, if the client tries to sync this secret to any destination they will r
 | 
			
		||||
This read access verification is only done when creating or updating an association. Once the association is created, revoking
 | 
			
		||||
read access to the policy that was used to sync the secret has no effect.
 | 
			
		||||
 | 
			
		||||
Vault does not control the permissions at the destination. It is the responsibility of the operator to configure proper
 | 
			
		||||
read access on the external system so synced secrets are not accessed unintentionally.
 | 
			
		||||
 | 
			
		||||
### Collisions and overwrites
 | 
			
		||||
 | 
			
		||||
Secrets Sync operates with a last-write-wins strategy. If a secret with the same name already exists at the destination,
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user