mirror of
https://github.com/optim-enterprises-bv/vault.git
synced 2025-10-29 17:52:32 +00:00
Softveda patch what is vault (#12686)
* Expanded the description for "What is Vault?". This descripton is what is used by HashiCorp CSA team.
This commit is contained in:
3
changelog/12684.txt
Normal file
3
changelog/12684.txt
Normal file
@@ -0,0 +1,3 @@
|
||||
```release-note:bug
|
||||
Doc: Expanded the description of "What is Vault?" to align with CSA team's content.
|
||||
```
|
||||
@@ -11,7 +11,22 @@ description: >-
|
||||
|
||||
HashiCorp Vault is an identity-based secrets and encryption management system. A _secret_ is anything that you want to tightly control access to, such as API encryption keys, passwords, and certificates. Vault provides encryption services that are gated by authentication and authorization methods. Using Vault’s UI, CLI, or HTTP API, access to secrets and other sensitive data can be securely stored and managed, tightly controlled (restricted), and auditable.
|
||||
|
||||
A modern system requires access to a multitude of secrets, including database credentials,
|
||||
If you are already familiar with the basics of Vault, the
|
||||
[documentation](/vault/docs) provides a better reference guide for all
|
||||
available features as well as internals.
|
||||
|
||||
## What is Vault?
|
||||
|
||||
HashiCorp Vault is an identity-based secrets and encryption management system.
|
||||
It provides encryption services that are gated by authentication and authorization
|
||||
methods to ensure secure, auditable and restricted access to _secrets_.
|
||||
It is used to secure, store and protect secrets and other sensitive data using a UI, CLI, or HTTP API.
|
||||
|
||||
A secret is anything that you
|
||||
want to tightly control access to, such as tokens, API keys, passwords, encryption keys or certificates.
|
||||
Vault provides a unified interface to any secret, while providing tight access
|
||||
control and recording a detailed audit log.
|
||||
|
||||
API keys for external services, credentials for service-oriented architecture
|
||||
communication, etc. It can be difficult to understand who is accessing which secrets, especially since this can be platform-specific. Adding on key rolling, secure storage, and
|
||||
detailed audit logs is almost impossible without a custom solution. This is
|
||||
|
||||
Reference in New Issue
Block a user