mirror of
https://github.com/optim-enterprises-bv/vault.git
synced 2025-10-29 17:52:32 +00:00
feat(website): migrates nav data format and updates docs pages (#11242)
* migrates nav data format and updates docs pages * removes sidebar_title from content files
This commit is contained in:
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: AliCloud - Auth Methods - HTTP API
|
page_title: AliCloud - Auth Methods - HTTP API
|
||||||
sidebar_title: AliCloud
|
|
||||||
description: This is the API documentation for the Vault AliCloud auth method.
|
description: This is the API documentation for the Vault AliCloud auth method.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: AppID - Auth Methods - HTTP API
|
page_title: AppID - Auth Methods - HTTP API
|
||||||
sidebar_title: App ID <sup>DEPRECATED</sup>
|
|
||||||
description: This is the API documentation for the Vault App ID auth method.
|
description: This is the API documentation for the Vault App ID auth method.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: AppRole - Auth Methods - HTTP API
|
page_title: AppRole - Auth Methods - HTTP API
|
||||||
sidebar_title: AppRole
|
|
||||||
description: This is the API documentation for the Vault AppRole auth method.
|
description: This is the API documentation for the Vault AppRole auth method.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: AWS - Auth Methods - HTTP API
|
page_title: AWS - Auth Methods - HTTP API
|
||||||
sidebar_title: AWS
|
|
||||||
description: This is the API documentation for the Vault AWS auth method.
|
description: This is the API documentation for the Vault AWS auth method.
|
||||||
---
|
---
|
||||||
|
|
||||||
@@ -516,8 +515,8 @@ $ curl \
|
|||||||
|
|
||||||
Configures the periodic tidying operation of the access listed identity entries.
|
Configures the periodic tidying operation of the access listed identity entries.
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
| :----- | :----------------------------------------- |
|
| :----- | :------------------------------------------ |
|
||||||
| `POST` | `/auth/aws/config/tidy/identity-accesslist` |
|
| `POST` | `/auth/aws/config/tidy/identity-accesslist` |
|
||||||
|
|
||||||
### Parameters
|
### Parameters
|
||||||
@@ -550,8 +549,8 @@ $ curl \
|
|||||||
|
|
||||||
Returns the previously configured periodic access list tidying settings.
|
Returns the previously configured periodic access list tidying settings.
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
| :----- | :----------------------------------------- |
|
| :----- | :------------------------------------------ |
|
||||||
| `GET` | `/auth/aws/config/tidy/identity-accesslist` |
|
| `GET` | `/auth/aws/config/tidy/identity-accesslist` |
|
||||||
|
|
||||||
### Sample Request
|
### Sample Request
|
||||||
@@ -577,8 +576,8 @@ $ curl \
|
|||||||
|
|
||||||
Deletes the previously configured periodic access list tidying settings.
|
Deletes the previously configured periodic access list tidying settings.
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
| :------- | :----------------------------------------- |
|
| :------- | :------------------------------------------ |
|
||||||
| `DELETE` | `/auth/aws/config/tidy/identity-accesslist` |
|
| `DELETE` | `/auth/aws/config/tidy/identity-accesslist` |
|
||||||
|
|
||||||
### Sample Request
|
### Sample Request
|
||||||
@@ -594,8 +593,8 @@ $ curl \
|
|||||||
|
|
||||||
Configures the periodic tidying operation of the deny listed role tag entries.
|
Configures the periodic tidying operation of the deny listed role tag entries.
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
| :----- | :---------------------------------------- |
|
| :----- | :--------------------------------------- |
|
||||||
| `POST` | `/auth/aws/config/tidy/roletag-denylist` |
|
| `POST` | `/auth/aws/config/tidy/roletag-denylist` |
|
||||||
|
|
||||||
### Parameters
|
### Parameters
|
||||||
@@ -628,8 +627,8 @@ $ curl \
|
|||||||
|
|
||||||
Returns the previously configured periodic deny list tidying settings.
|
Returns the previously configured periodic deny list tidying settings.
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
| :----- | :---------------------------------------- |
|
| :----- | :--------------------------------------- |
|
||||||
| `GET` | `/auth/aws/config/tidy/roletag-denylist` |
|
| `GET` | `/auth/aws/config/tidy/roletag-denylist` |
|
||||||
|
|
||||||
### Sample Request
|
### Sample Request
|
||||||
@@ -655,8 +654,8 @@ $ curl \
|
|||||||
|
|
||||||
Deletes the previously configured periodic deny list tidying settings.
|
Deletes the previously configured periodic deny list tidying settings.
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
| :------- | :---------------------------------------- |
|
| :------- | :--------------------------------------- |
|
||||||
| `DELETE` | `/auth/aws/config/tidy/roletag-denylist` |
|
| `DELETE` | `/auth/aws/config/tidy/roletag-denylist` |
|
||||||
|
|
||||||
### Sample Request
|
### Sample Request
|
||||||
@@ -1109,8 +1108,8 @@ that if the role tag was previously used to perform a successful login,
|
|||||||
placing the tag in the deny list does not invalidate the already issued
|
placing the tag in the deny list does not invalidate the already issued
|
||||||
token.
|
token.
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
| :----- | :-------------------------------------- |
|
| :----- | :------------------------------------- |
|
||||||
| `POST` | `/auth/aws/roletag-denylist/:role_tag` |
|
| `POST` | `/auth/aws/roletag-denylist/:role_tag` |
|
||||||
|
|
||||||
### Parameters
|
### Parameters
|
||||||
@@ -1132,8 +1131,8 @@ $ curl \
|
|||||||
|
|
||||||
Returns the deny list entry of a previously deny listed role tag.
|
Returns the deny list entry of a previously deny listed role tag.
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
| :----- | :-------------------------------------- |
|
| :----- | :------------------------------------- |
|
||||||
| `GET` | `/auth/aws/roletag-denylist/:role_tag` |
|
| `GET` | `/auth/aws/roletag-denylist/:role_tag` |
|
||||||
|
|
||||||
### Parameters
|
### Parameters
|
||||||
@@ -1165,8 +1164,8 @@ $ curl \
|
|||||||
|
|
||||||
Lists all the role tags that are deny listed.
|
Lists all the role tags that are deny listed.
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
| :----- | :---------------------------- |
|
| :----- | :--------------------------- |
|
||||||
| `LIST` | `/auth/aws/roletag-denylist` |
|
| `LIST` | `/auth/aws/roletag-denylist` |
|
||||||
|
|
||||||
### Sample Request
|
### Sample Request
|
||||||
@@ -1194,8 +1193,8 @@ $ curl \
|
|||||||
|
|
||||||
Deletes a deny listed role tag.
|
Deletes a deny listed role tag.
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
| :------- | :-------------------------------------- |
|
| :------- | :------------------------------------- |
|
||||||
| `DELETE` | `/auth/aws/roletag-denylist/:role_tag` |
|
| `DELETE` | `/auth/aws/roletag-denylist/:role_tag` |
|
||||||
|
|
||||||
### Parameters
|
### Parameters
|
||||||
@@ -1218,8 +1217,8 @@ $ curl \
|
|||||||
Cleans up the entries in the deny listed based on expiration time on the entry and
|
Cleans up the entries in the deny listed based on expiration time on the entry and
|
||||||
`safety_buffer`.
|
`safety_buffer`.
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
| :----- | :--------------------------------- |
|
| :----- | :-------------------------------- |
|
||||||
| `POST` | `/auth/aws/tidy/roletag-denylist` |
|
| `POST` | `/auth/aws/tidy/roletag-denylist` |
|
||||||
|
|
||||||
### Parameters
|
### Parameters
|
||||||
@@ -1242,8 +1241,8 @@ $ curl \
|
|||||||
Returns an entry in the identity access list. An entry will be created/updated by every
|
Returns an entry in the identity access list. An entry will be created/updated by every
|
||||||
successful login.
|
successful login.
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
| :----- | :------------------------------------------ |
|
| :----- | :------------------------------------------- |
|
||||||
| `GET` | `/auth/aws/identity-accesslist/:instance_id` |
|
| `GET` | `/auth/aws/identity-accesslist/:instance_id` |
|
||||||
|
|
||||||
### Parameters
|
### Parameters
|
||||||
@@ -1278,8 +1277,8 @@ $ curl \
|
|||||||
|
|
||||||
Lists all the instance IDs that are in the access list of successful logins.
|
Lists all the instance IDs that are in the access list of successful logins.
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
| :----- | :----------------------------- |
|
| :----- | :------------------------------ |
|
||||||
| `LIST` | `/auth/aws/identity-accesslist` |
|
| `LIST` | `/auth/aws/identity-accesslist` |
|
||||||
|
|
||||||
### Sample Request
|
### Sample Request
|
||||||
@@ -1305,8 +1304,8 @@ $ curl \
|
|||||||
|
|
||||||
Deletes a cache of the successful login from an instance.
|
Deletes a cache of the successful login from an instance.
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
| :------- | :------------------------------------------ |
|
| :------- | :------------------------------------------- |
|
||||||
| `DELETE` | `/auth/aws/identity-accesslist/:instance_id` |
|
| `DELETE` | `/auth/aws/identity-accesslist/:instance_id` |
|
||||||
|
|
||||||
### Parameters
|
### Parameters
|
||||||
@@ -1329,8 +1328,8 @@ $ curl \
|
|||||||
Cleans up the entries in the access list based on expiration time and
|
Cleans up the entries in the access list based on expiration time and
|
||||||
`safety_buffer`.
|
`safety_buffer`.
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
| :----- | :---------------------------------- |
|
| :----- | :----------------------------------- |
|
||||||
| `POST` | `/auth/aws/tidy/identity-accesslist` |
|
| `POST` | `/auth/aws/tidy/identity-accesslist` |
|
||||||
|
|
||||||
### Parameters
|
### Parameters
|
||||||
@@ -1361,4 +1360,3 @@ URLs are deprecated. The affected APIs include:
|
|||||||
| `/auth/aws/tidy/roletag-denylist` | `/auth/aws/tidy/roletag-blacklist` |
|
| `/auth/aws/tidy/roletag-denylist` | `/auth/aws/tidy/roletag-blacklist` |
|
||||||
| `/auth/aws/config/tidy/identity-accesslist` | `/auth/aws/config/tidy/identity-whitelist` |
|
| `/auth/aws/config/tidy/identity-accesslist` | `/auth/aws/config/tidy/identity-whitelist` |
|
||||||
| `/auth/aws/config/tidy/roletag-denylist` | `/auth/aws/config/tidy/roletag-blacklist` |
|
| `/auth/aws/config/tidy/roletag-denylist` | `/auth/aws/config/tidy/roletag-blacklist` |
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: Azure - Auth Methods - HTTP API
|
page_title: Azure - Auth Methods - HTTP API
|
||||||
sidebar_title: Azure
|
|
||||||
description: |-
|
description: |-
|
||||||
This is the API documentation for the Vault Azure authentication
|
This is the API documentation for the Vault Azure authentication
|
||||||
method plugin.
|
method plugin.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: TLS Certificate - Auth Methods - HTTP API
|
page_title: TLS Certificate - Auth Methods - HTTP API
|
||||||
sidebar_title: TLS Certificates
|
|
||||||
description: |-
|
description: |-
|
||||||
This is the API documentation for the Vault TLS Certificate authentication
|
This is the API documentation for the Vault TLS Certificate authentication
|
||||||
method.
|
method.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: Cloud Foundry - Auth Methods - HTTP API
|
page_title: Cloud Foundry - Auth Methods - HTTP API
|
||||||
sidebar_title: Cloud Foundry
|
|
||||||
description: This is the API documentation for the Vault Cloud Foundry auth method.
|
description: This is the API documentation for the Vault Cloud Foundry auth method.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: Google Cloud - Auth Methods - HTTP API
|
page_title: Google Cloud - Auth Methods - HTTP API
|
||||||
sidebar_title: Google Cloud
|
|
||||||
description: |-
|
description: |-
|
||||||
This is the API documentation for the Vault Google Cloud authentication
|
This is the API documentation for the Vault Google Cloud authentication
|
||||||
method.
|
method.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: GitHub - Auth Methods - HTTP API
|
page_title: GitHub - Auth Methods - HTTP API
|
||||||
sidebar_title: GitHub
|
|
||||||
description: This is the API documentation for the Vault GitHub auth method.
|
description: This is the API documentation for the Vault GitHub auth method.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: Auth Methods - HTTP API
|
page_title: Auth Methods - HTTP API
|
||||||
sidebar_title: Auth Methods
|
|
||||||
description: |-
|
description: |-
|
||||||
Each auth method publishes its own set of API paths and methods.
|
Each auth method publishes its own set of API paths and methods.
|
||||||
These endpoints are documented in this section.
|
These endpoints are documented in this section.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: JWT/OIDC - Auth Methods - HTTP API
|
page_title: JWT/OIDC - Auth Methods - HTTP API
|
||||||
sidebar_title: JWT/OIDC
|
|
||||||
description: |-
|
description: |-
|
||||||
This is the API documentation for the Vault JWT/OIDC authentication
|
This is the API documentation for the Vault JWT/OIDC authentication
|
||||||
method plugin.
|
method plugin.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: Kerberos - Auth Methods - HTTP API
|
page_title: Kerberos - Auth Methods - HTTP API
|
||||||
sidebar_title: Kerberos
|
|
||||||
description: This is the API documentation for the Vault Kerberos auth method plugin.
|
description: This is the API documentation for the Vault Kerberos auth method plugin.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: Kubernetes - Auth Methods - HTTP API
|
page_title: Kubernetes - Auth Methods - HTTP API
|
||||||
sidebar_title: Kubernetes
|
|
||||||
description: This is the API documentation for the Vault Kubernetes auth method plugin.
|
description: This is the API documentation for the Vault Kubernetes auth method plugin.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: LDAP - Auth Methods - HTTP API
|
page_title: LDAP - Auth Methods - HTTP API
|
||||||
sidebar_title: LDAP
|
|
||||||
description: This is the API documentation for the Vault LDAP auth method.
|
description: This is the API documentation for the Vault LDAP auth method.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: OCI - Auth Methods - HTTP API
|
page_title: OCI - Auth Methods - HTTP API
|
||||||
sidebar_title: OCI
|
|
||||||
description: This is the API documentation for the Vault OCI auth method plugin.
|
description: This is the API documentation for the Vault OCI auth method plugin.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: Okta - Auth Methods - HTTP API
|
page_title: Okta - Auth Methods - HTTP API
|
||||||
sidebar_title: Okta
|
|
||||||
description: This is the API documentation for the Vault Okta auth method.
|
description: This is the API documentation for the Vault Okta auth method.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: RADIUS - Auth Methods - HTTP API
|
page_title: RADIUS - Auth Methods - HTTP API
|
||||||
sidebar_title: RADIUS
|
|
||||||
description: This is the API documentation for the Vault RADIUS auth method.
|
description: This is the API documentation for the Vault RADIUS auth method.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: Token - Auth Methods - HTTP API
|
page_title: Token - Auth Methods - HTTP API
|
||||||
sidebar_title: Tokens
|
|
||||||
description: This is the API documentation for the Vault token auth method.
|
description: This is the API documentation for the Vault token auth method.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: Userpass - Auth Methods - HTTP API
|
page_title: Userpass - Auth Methods - HTTP API
|
||||||
sidebar_title: Username & Password
|
|
||||||
description: |-
|
description: |-
|
||||||
This is the API documentation for the Vault username and password
|
This is the API documentation for the Vault username and password
|
||||||
auth method.
|
auth method.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: HTTP API
|
page_title: HTTP API
|
||||||
sidebar_title: Overview
|
|
||||||
description: Vault has an HTTP API that can be used to control every aspect of Vault.
|
description: Vault has an HTTP API that can be used to control every aspect of Vault.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: 'HTTP API: Libraries'
|
page_title: 'HTTP API: Libraries'
|
||||||
sidebar_title: Client Libraries
|
|
||||||
description: >-
|
description: >-
|
||||||
List of official and community contributed libraries for interacting with the
|
List of official and community contributed libraries for interacting with the
|
||||||
Vault HTTP API.
|
Vault HTTP API.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: Related Tools
|
page_title: Related Tools
|
||||||
sidebar_title: Related Tools
|
|
||||||
description: Short list of third-party tools that work with or are related to Vault.
|
description: Short list of third-party tools that work with or are related to Vault.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: Active Directory - Secrets Engines - HTTP API
|
page_title: Active Directory - Secrets Engines - HTTP API
|
||||||
sidebar_title: Active Directory
|
|
||||||
description: This is the API documentation for the Vault Active Directory secrets engine.
|
description: This is the API documentation for the Vault Active Directory secrets engine.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: AliCloud - Secrets Engines - HTTP API
|
page_title: AliCloud - Secrets Engines - HTTP API
|
||||||
sidebar_title: AliCloud
|
|
||||||
description: This is the API documentation for the Vault AliCloud secrets engine.
|
description: This is the API documentation for the Vault AliCloud secrets engine.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: AWS - Secrets Engines - HTTP API
|
page_title: AWS - Secrets Engines - HTTP API
|
||||||
sidebar_title: AWS
|
|
||||||
description: This is the API documentation for the Vault AWS secrets engine.
|
description: This is the API documentation for the Vault AWS secrets engine.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: Azure - Secrets Engines - HTTP API
|
page_title: Azure - Secrets Engines - HTTP API
|
||||||
sidebar_title: Azure
|
|
||||||
description: This is the API documentation for the Vault Azure secrets engine.
|
description: This is the API documentation for the Vault Azure secrets engine.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: Cassandra - Secrets Engines - HTTP API
|
page_title: Cassandra - Secrets Engines - HTTP API
|
||||||
sidebar_title: Cassandra <sup>DEPRECATED</sup>
|
|
||||||
description: This is the API documentation for the Vault Cassandra secrets engine.
|
description: This is the API documentation for the Vault Cassandra secrets engine.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: Consul - Secrets Engines - HTTP API
|
page_title: Consul - Secrets Engines - HTTP API
|
||||||
sidebar_title: Consul
|
|
||||||
description: This is the API documentation for the Vault Consul secrets engine.
|
description: This is the API documentation for the Vault Consul secrets engine.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: Cubbyhole - Secrets Engines - HTTP API
|
page_title: Cubbyhole - Secrets Engines - HTTP API
|
||||||
sidebar_title: Cubbyhole
|
|
||||||
description: This is the API documentation for the Vault Cubbyhole secrets engine.
|
description: This is the API documentation for the Vault Cubbyhole secrets engine.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: Cassandra - Database - Secrets Engines - HTTP API
|
page_title: Cassandra - Database - Secrets Engines - HTTP API
|
||||||
sidebar_title: Cassandra
|
|
||||||
description: >-
|
description: >-
|
||||||
The Cassandra plugin for Vault's database secrets engine generates database
|
The Cassandra plugin for Vault's database secrets engine generates database
|
||||||
credentials to access Cassandra servers.
|
credentials to access Cassandra servers.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: Couchbase - Database - Secrets Engines - HTTP API
|
page_title: Couchbase - Database - Secrets Engines - HTTP API
|
||||||
sidebar_title: Couchbase
|
|
||||||
description: >-
|
description: >-
|
||||||
The Couchbase plugin for Vault's database secrets engine generates database
|
The Couchbase plugin for Vault's database secrets engine generates database
|
||||||
credentials to access Couchbase servers.
|
credentials to access Couchbase servers.
|
||||||
@@ -59,17 +58,17 @@ V_{{.DisplayName | uppercase | truncate 64}}_{{.RoleName | uppercase | truncate
|
|||||||
<details>
|
<details>
|
||||||
<summary><b>Example Usernames:</b></summary>
|
<summary><b>Example Usernames:</b></summary>
|
||||||
|
|
||||||
| Example | |
|
| Example | |
|
||||||
| ------------- | ---------------------------------------------------- |
|
| ------------- | ---------------------------------------------------- |
|
||||||
| `DisplayName` | `token` |
|
| `DisplayName` | `token` |
|
||||||
| `RoleName` | `myrolename` |
|
| `RoleName` | `myrolename` |
|
||||||
| Username | `V_TOKEN_MYROLENAME_USZT1N4CYHAL4M0XTGX3_1614294836` |
|
| Username | `V_TOKEN_MYROLENAME_USZT1N4CYHAL4M0XTGX3_1614294836` |
|
||||||
|
|
||||||
| Example | |
|
| Example | |
|
||||||
| ------------- | ------------------------------------------------------------------------------ |
|
| ------------- | ------------------------------------------------------------------------------ |
|
||||||
| `DisplayName` | `amuchlonger_dispname` |
|
| `DisplayName` | `amuchlonger_dispname` |
|
||||||
| `RoleName` | `role-name-with-dashes` |
|
| `RoleName` | `role-name-with-dashes` |
|
||||||
| Username | `V_AMUCHLONGER_DISPNAME_ROLE-NAME-WITH-DASHES_S0T9XB0JSAB9NQZ7YJ40_1614294836` |
|
| Username | `V_AMUCHLONGER_DISPNAME_ROLE-NAME-WITH-DASHES_S0T9XB0JSAB9NQZ7YJ40_1614294836` |
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
</details>
|
</details>
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: Elasticsearch - Database - Secrets Engines - HTTP API
|
page_title: Elasticsearch - Database - Secrets Engines - HTTP API
|
||||||
sidebar_title: Elasticsearch
|
|
||||||
description: >-
|
description: >-
|
||||||
The Elasticsearch plugin for Vault's database secrets engine generates
|
The Elasticsearch plugin for Vault's database secrets engine generates
|
||||||
database credentials to access Elasticsearch.
|
database credentials to access Elasticsearch.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: HANA - Database - Secrets Engines - HTTP API
|
page_title: HANA - Database - Secrets Engines - HTTP API
|
||||||
sidebar_title: HanaDB
|
|
||||||
description: >-
|
description: >-
|
||||||
The HANA plugin for Vault's database secrets engine generates database
|
The HANA plugin for Vault's database secrets engine generates database
|
||||||
credentials to access HANA servers.
|
credentials to access HANA servers.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: Database - Secrets Engines - HTTP API
|
page_title: Database - Secrets Engines - HTTP API
|
||||||
sidebar_title: Databases
|
|
||||||
description: Top page for database secrets engine information
|
description: Top page for database secrets engine information
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: Influxdb - Database - Secrets Engines - HTTP API
|
page_title: Influxdb - Database - Secrets Engines - HTTP API
|
||||||
sidebar_title: Influxdb
|
|
||||||
description: >-
|
description: >-
|
||||||
The Influxdb plugin for Vault's database secrets engine generates database
|
The Influxdb plugin for Vault's database secrets engine generates database
|
||||||
credentials to access Influxdb servers.
|
credentials to access Influxdb servers.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: MongoDB - Database - Secrets Engines - HTTP API
|
page_title: MongoDB - Database - Secrets Engines - HTTP API
|
||||||
sidebar_title: MongoDB
|
|
||||||
description: >-
|
description: >-
|
||||||
The MongoDB plugin for Vault's database secrets engine generates database
|
The MongoDB plugin for Vault's database secrets engine generates database
|
||||||
credentials to access MongoDB servers.
|
credentials to access MongoDB servers.
|
||||||
@@ -59,17 +58,17 @@ has a number of parameters to further configure a connection.
|
|||||||
<details>
|
<details>
|
||||||
<summary><b>Example Usernames:</b></summary>
|
<summary><b>Example Usernames:</b></summary>
|
||||||
|
|
||||||
| Example | |
|
| Example | |
|
||||||
| ------------- | ---------------------------------------------------- |
|
| ------------- | ---------------------------------------------------- |
|
||||||
| `DisplayName` | `token` |
|
| `DisplayName` | `token` |
|
||||||
| `RoleName` | `myrolename` |
|
| `RoleName` | `myrolename` |
|
||||||
| Username | `v-token-myrolename-jNFRlKsZZMxJEx60o66i-1614294836` |
|
| Username | `v-token-myrolename-jNFRlKsZZMxJEx60o66i-1614294836` |
|
||||||
|
|
||||||
| Example | |
|
| Example | |
|
||||||
| ------------- | ------------------------------------------------------------------- |
|
| ------------- | ------------------------------------------------------------------- |
|
||||||
| `DisplayName` | `amuchlonger_dispname` |
|
| `DisplayName` | `amuchlonger_dispname` |
|
||||||
| `RoleName` | `role-name-with-dashes` |
|
| `RoleName` | `role-name-with-dashes` |
|
||||||
| Username | `v-amuchlonger_dis-role-name-with--jNFRlKsZZMxJEx60o66i-1614294836` |
|
| Username | `v-amuchlonger_dis-role-name-with--jNFRlKsZZMxJEx60o66i-1614294836` |
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
</details>
|
</details>
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: 'api'
|
layout: 'api'
|
||||||
page_title: 'MongoDB Atlas - Database - Secrets Engines - HTTP API'
|
page_title: 'MongoDB Atlas - Database - Secrets Engines - HTTP API'
|
||||||
sidebar_title: 'MongoDB Atlas'
|
|
||||||
description: |-
|
description: |-
|
||||||
The MongoDB Atlas plugin for Vault's Database Secrets Engine generates MongoDB Database User credentials for MongoDB Atlas.
|
The MongoDB Atlas plugin for Vault's Database Secrets Engine generates MongoDB Database User credentials for MongoDB Atlas.
|
||||||
---
|
---
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: MSSQL - Database - Secrets Engines - HTTP API
|
page_title: MSSQL - Database - Secrets Engines - HTTP API
|
||||||
sidebar_title: MSSQL
|
|
||||||
description: >-
|
description: >-
|
||||||
The MSSQL plugin for Vault's database secrets engine generates database
|
The MSSQL plugin for Vault's database secrets engine generates database
|
||||||
credentials to access MSSQL servers.
|
credentials to access MSSQL servers.
|
||||||
@@ -58,17 +57,17 @@ has a number of parameters to further configure a connection.
|
|||||||
<details>
|
<details>
|
||||||
<summary><b>Example Usernames:</b></summary>
|
<summary><b>Example Usernames:</b></summary>
|
||||||
|
|
||||||
| Example | |
|
| Example | |
|
||||||
| ------------- | ---------------------------------------------------- |
|
| ------------- | ---------------------------------------------------- |
|
||||||
| `DisplayName` | `token` |
|
| `DisplayName` | `token` |
|
||||||
| `RoleName` | `myrolename` |
|
| `RoleName` | `myrolename` |
|
||||||
| Username | `v-token-myrolename-jNFRlKsZZMxJEx60o66i-1614294836` |
|
| Username | `v-token-myrolename-jNFRlKsZZMxJEx60o66i-1614294836` |
|
||||||
|
|
||||||
| Example | |
|
| Example | |
|
||||||
| ------------- | ----------------------------------------------------------------------------- |
|
| ------------- | ----------------------------------------------------------------------------- |
|
||||||
| `DisplayName` | `amuchlonger_dispname` |
|
| `DisplayName` | `amuchlonger_dispname` |
|
||||||
| `RoleName` | `role-name-with-dashes` |
|
| `RoleName` | `role-name-with-dashes` |
|
||||||
| Username | `v-amuchlonger_dispname-role-name-with-dashe-LUHU9xqm6YNisikA3iCQ-1614294836` |
|
| Username | `v-amuchlonger_dispname-role-name-with-dashe-LUHU9xqm6YNisikA3iCQ-1614294836` |
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
</details>
|
</details>
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: MySQL/MariaDB - Database - Secrets Engines - HTTP API
|
page_title: MySQL/MariaDB - Database - Secrets Engines - HTTP API
|
||||||
sidebar_title: MySQL/MariaDB
|
|
||||||
description: >-
|
description: >-
|
||||||
The MySQL/MariaDB plugin for Vault's database secrets engine generates
|
The MySQL/MariaDB plugin for Vault's database secrets engine generates
|
||||||
database credentials to access MySQL and MariaDB servers.
|
database credentials to access MySQL and MariaDB servers.
|
||||||
@@ -95,17 +94,17 @@ has a number of parameters to further configure a connection.
|
|||||||
<details>
|
<details>
|
||||||
<summary><b>Example Usernames:</b></summary>
|
<summary><b>Example Usernames:</b></summary>
|
||||||
|
|
||||||
| Example | |
|
| Example | |
|
||||||
| ------------- | ------------------ |
|
| ------------- | ------------------ |
|
||||||
| `DisplayName` | `token` |
|
| `DisplayName` | `token` |
|
||||||
| `RoleName` | `myrolename` |
|
| `RoleName` | `myrolename` |
|
||||||
| Username | `v-myro-jNFRlKsZZ` |
|
| Username | `v-myro-jNFRlKsZZ` |
|
||||||
|
|
||||||
| Example | |
|
| Example | |
|
||||||
| ------------- | ----------------------- |
|
| ------------- | ----------------------- |
|
||||||
| `DisplayName` | `amuchlonger_dispname` |
|
| `DisplayName` | `amuchlonger_dispname` |
|
||||||
| `RoleName` | `role-name-with-dashes` |
|
| `RoleName` | `role-name-with-dashes` |
|
||||||
| Username | `v-role-b9ODeKsfl` |
|
| Username | `v-role-b9ODeKsfl` |
|
||||||
|
|
||||||
</details>
|
</details>
|
||||||
</details>
|
</details>
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: Oracle - Database - Secrets Engines - HTTP API
|
page_title: Oracle - Database - Secrets Engines - HTTP API
|
||||||
sidebar_title: Oracle
|
|
||||||
description: >-
|
description: >-
|
||||||
The Oracle plugin for Vault's database secrets engine generates database
|
The Oracle plugin for Vault's database secrets engine generates database
|
||||||
credentials to access Oracle servers.
|
credentials to access Oracle servers.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: PostgreSQL - Database - Secrets Engines - HTTP API
|
page_title: PostgreSQL - Database - Secrets Engines - HTTP API
|
||||||
sidebar_title: PostgreSQL
|
|
||||||
description: >-
|
description: >-
|
||||||
The PostgreSQL plugin for Vault's database secrets engine generates database
|
The PostgreSQL plugin for Vault's database secrets engine generates database
|
||||||
credentials to access PostgreSQL servers.
|
credentials to access PostgreSQL servers.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: Redshift - Database - Secrets Engines - HTTP API
|
page_title: Redshift - Database - Secrets Engines - HTTP API
|
||||||
sidebar_title: Redshift
|
|
||||||
description: >-
|
description: >-
|
||||||
The Redshift plugin for Vault's database secrets engine generates database
|
The Redshift plugin for Vault's database secrets engine generates database
|
||||||
credentials to access the AWS Redshift service.
|
credentials to access the AWS Redshift service.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: Snowflake - Database - Secrets Engines - HTTP API
|
page_title: Snowflake - Database - Secrets Engines - HTTP API
|
||||||
sidebar_title: Snowflake
|
|
||||||
description: >-
|
description: >-
|
||||||
The Snowflake plugin for Vault's database secrets engine generates database
|
The Snowflake plugin for Vault's database secrets engine generates database
|
||||||
credentials to access Snowflake servers.
|
credentials to access Snowflake servers.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: Google Cloud - Secrets Engines - HTTP API
|
page_title: Google Cloud - Secrets Engines - HTTP API
|
||||||
sidebar_title: Google Cloud
|
|
||||||
description: This is the API documentation for the Vault Google Cloud secrets engine.
|
description: This is the API documentation for the Vault Google Cloud secrets engine.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: Google Cloud KMS - Secrets Engines - HTTP API
|
page_title: Google Cloud KMS - Secrets Engines - HTTP API
|
||||||
sidebar_title: Google Cloud KMS
|
|
||||||
description: This is the API documentation for the Vault Google Cloud KMS secrets engine.
|
description: This is the API documentation for the Vault Google Cloud KMS secrets engine.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: 'Identity Secret Backend: Entity Alias - HTTP API'
|
page_title: 'Identity Secret Backend: Entity Alias - HTTP API'
|
||||||
sidebar_title: Entity Alias
|
|
||||||
description: >-
|
description: >-
|
||||||
This is the API documentation for managing entity aliases in the identity
|
This is the API documentation for managing entity aliases in the identity
|
||||||
store.
|
store.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: 'Identity Secret Backend: Entity - HTTP API'
|
page_title: 'Identity Secret Backend: Entity - HTTP API'
|
||||||
sidebar_title: Entity
|
|
||||||
description: This is the API documentation for managing entities in the identity store.
|
description: This is the API documentation for managing entities in the identity store.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: 'Identity Secret Backend: Group Alias - HTTP API'
|
page_title: 'Identity Secret Backend: Group Alias - HTTP API'
|
||||||
sidebar_title: Group Alias
|
|
||||||
description: >-
|
description: >-
|
||||||
This is the API documentation for managing the group aliases in the identity
|
This is the API documentation for managing the group aliases in the identity
|
||||||
store.
|
store.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: 'Identity Secret Backend: Group - HTTP API'
|
page_title: 'Identity Secret Backend: Group - HTTP API'
|
||||||
sidebar_title: Group
|
|
||||||
description: This is the API documentation for managing groups in the identity store.
|
description: This is the API documentation for managing groups in the identity store.
|
||||||
---
|
---
|
||||||
|
|
||||||
@@ -15,7 +14,7 @@ This endpoint creates or updates a Group.
|
|||||||
|
|
||||||
### Parameters
|
### Parameters
|
||||||
|
|
||||||
- `name` `(string: entity-<UUID>)` – Name of the group. If set (and
|
- `name` `(string: entity-<UUID>)` – Name of the group. If set (and
|
||||||
ID is not set), updates the corresponding existing group.
|
ID is not set), updates the corresponding existing group.
|
||||||
|
|
||||||
- `id` `(string: <optional>)` - ID of the group. If set, updates the
|
- `id` `(string: <optional>)` - ID of the group. If set, updates the
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: Identity - Secrets Engines - HTTP API
|
page_title: Identity - Secrets Engines - HTTP API
|
||||||
sidebar_title: Identity
|
|
||||||
description: This is the API documentation for the Vault Identity secrets engine.
|
description: This is the API documentation for the Vault Identity secrets engine.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: 'Identity Secret Backend: Lookup - HTTP API'
|
page_title: 'Identity Secret Backend: Lookup - HTTP API'
|
||||||
sidebar_title: Lookup
|
|
||||||
description: |-
|
description: |-
|
||||||
This is the API documentation for entity and group lookups from identity
|
This is the API documentation for entity and group lookups from identity
|
||||||
store.
|
store.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: 'Identity Secret Backend: Identity Tokens - HTTP API'
|
page_title: 'Identity Secret Backend: Identity Tokens - HTTP API'
|
||||||
sidebar_title: Identity Tokens
|
|
||||||
description: >-
|
description: >-
|
||||||
This is the API documentation for configuring, acquiring, and validating vault
|
This is the API documentation for configuring, acquiring, and validating vault
|
||||||
issued identity tokens.
|
issued identity tokens.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: Secrets Engines - HTTP API
|
page_title: Secrets Engines - HTTP API
|
||||||
sidebar_title: Secrets Engines
|
|
||||||
description: |-
|
description: |-
|
||||||
Each secrets engine publishes its own set of API paths and methods. These
|
Each secrets engine publishes its own set of API paths and methods. These
|
||||||
endpoints are documented in this section.
|
endpoints are documented in this section.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: AWS KMS - Key Management - Secrets Engines - HTTP API
|
page_title: AWS KMS - Key Management - Secrets Engines - HTTP API
|
||||||
sidebar_title: AWS KMS
|
|
||||||
description: The AWS KMS API documentation for the Key Management secrets engine.
|
description: The AWS KMS API documentation for the Key Management secrets engine.
|
||||||
---
|
---
|
||||||
|
|
||||||
@@ -43,13 +42,13 @@ the given parameter values.
|
|||||||
as environment variables. Credentials provided to this parameter will take precedence over
|
as environment variables. Credentials provided to this parameter will take precedence over
|
||||||
credentials provided via environment variables.
|
credentials provided via environment variables.
|
||||||
|
|
||||||
- `access_key` `(string: <required>)` - The AWS access key ID. May also be specified
|
- `access_key` `(string: <required>)` - The AWS access key ID. May also be specified
|
||||||
by the `AWS_ACCESS_KEY_ID` environment variable.
|
by the `AWS_ACCESS_KEY_ID` environment variable.
|
||||||
- `secret_key` `(string: <required>)` - The AWS secret access key. May also be specified
|
- `secret_key` `(string: <required>)` - The AWS secret access key. May also be specified
|
||||||
by the `AWS_SECRET_ACCESS_KEY` environment variable.
|
by the `AWS_SECRET_ACCESS_KEY` environment variable.
|
||||||
- `session_token` `(string: <optional>)` - The AWS session token. May also be specified
|
- `session_token` `(string: <optional>)` - The AWS session token. May also be specified
|
||||||
by the `AWS_SESSION_TOKEN` environment variable.
|
by the `AWS_SESSION_TOKEN` environment variable.
|
||||||
- `endpoint` `(string: <optional>)` - The KMS API endpoint to be used to make AWS KMS
|
- `endpoint` `(string: <optional>)` - The KMS API endpoint to be used to make AWS KMS
|
||||||
requests. May also be specified by the `AWS_KMS_ENDPOINT` environment variable. This
|
requests. May also be specified by the `AWS_KMS_ENDPOINT` environment variable. This
|
||||||
is useful when connecting to KMS over a [VPC Endpoint](https://docs.aws.amazon.com/kms/latest/developerguide/kms-vpc-endpoint.html).
|
is useful when connecting to KMS over a [VPC Endpoint](https://docs.aws.amazon.com/kms/latest/developerguide/kms-vpc-endpoint.html).
|
||||||
If not set, the secrets engine will use the default API endpoint for the region.
|
If not set, the secrets engine will use the default API endpoint for the region.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: Azure Key Vault - Key Management - Secrets Engines - HTTP API
|
page_title: Azure Key Vault - Key Management - Secrets Engines - HTTP API
|
||||||
sidebar_title: Azure Key Vault
|
|
||||||
description: The Azure Key Vault API documentation for the Key Management secrets engine.
|
description: The Azure Key Vault API documentation for the Key Management secrets engine.
|
||||||
---
|
---
|
||||||
|
|
||||||
@@ -40,11 +39,11 @@ the given parameter values.
|
|||||||
be specified as environment variables. Environment variables will take precedence over
|
be specified as environment variables. Environment variables will take precedence over
|
||||||
credentials provided via this parameter.
|
credentials provided via this parameter.
|
||||||
|
|
||||||
- `tenant_id` `(string: <required>)` - The tenant ID for the Azure Active Directory
|
- `tenant_id` `(string: <required>)` - The tenant ID for the Azure Active Directory
|
||||||
organization. May also be specified by the `AZURE_TENANT_ID` environment variable.
|
organization. May also be specified by the `AZURE_TENANT_ID` environment variable.
|
||||||
- `client_id` `(string: <required or MSI>)` - The client ID for credentials to invoke the
|
- `client_id` `(string: <required or MSI>)` - The client ID for credentials to invoke the
|
||||||
Azure APIs. May also be specified by the `AZURE_CLIENT_ID` environment variable.
|
Azure APIs. May also be specified by the `AZURE_CLIENT_ID` environment variable.
|
||||||
- `client_secret` `(string: <required or MSI>)` - The client secret for credentials to invoke
|
- `client_secret` `(string: <required or MSI>)` - The client secret for credentials to invoke
|
||||||
the Azure APIs. May also be specified by the `AZURE_CLIENT_SECRET` environment variable.
|
the Azure APIs. May also be specified by the `AZURE_CLIENT_SECRET` environment variable.
|
||||||
- `environment` `(string: "AzurePublicCloud")` - The Azure Cloud environment API endpoints to
|
- `environment` `(string: "AzurePublicCloud")` - The Azure Cloud environment API endpoints to
|
||||||
use. May also be specified by the `AZURE_ENVIRONMENT` environment variable.
|
use. May also be specified by the `AZURE_ENVIRONMENT` environment variable.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: Key Management - Secrets Engines - HTTP API
|
page_title: Key Management - Secrets Engines - HTTP API
|
||||||
sidebar_title: Key Management <sup>ENTERPRISE</sup>
|
|
||||||
description: The API documentation for the Key Management secrets engine.
|
description: The API documentation for the Key Management secrets engine.
|
||||||
---
|
---
|
||||||
|
|
||||||
@@ -266,8 +265,8 @@ the given parameter values.
|
|||||||
the [KMS Providers](/docs/secrets/key-management#kms-providers) section. The following values
|
the [KMS Providers](/docs/secrets/key-management#kms-providers) section. The following values
|
||||||
are supported:
|
are supported:
|
||||||
|
|
||||||
- `azurekeyvault`
|
- `azurekeyvault`
|
||||||
- `awskms`
|
- `awskms`
|
||||||
|
|
||||||
### Common Parameters
|
### Common Parameters
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: KMIP - Secrets Engines - HTTP API
|
page_title: KMIP - Secrets Engines - HTTP API
|
||||||
sidebar_title: KMIP <sup>ENTERPRISE</sup>
|
|
||||||
description: This is the API documentation for the Vault KMIP secrets engine.
|
description: This is the API documentation for the Vault KMIP secrets engine.
|
||||||
---
|
---
|
||||||
|
|
||||||
@@ -24,9 +23,9 @@ update your API calls accordingly.
|
|||||||
This endpoint configures shared information for the secrets engine. After writing
|
This endpoint configures shared information for the secrets engine. After writing
|
||||||
to it the KMIP engine will generate a CA and start listening for KMIP requests.
|
to it the KMIP engine will generate a CA and start listening for KMIP requests.
|
||||||
If the server was already running and any non-client settings are changed, the
|
If the server was already running and any non-client settings are changed, the
|
||||||
server will be restarted using the new settings. All generated CAs will use
|
server will be restarted using the new settings. All generated CAs will use
|
||||||
entropy augmentation to generate their certificates if entropy augmentation
|
entropy augmentation to generate their certificates if entropy augmentation
|
||||||
is enabled.
|
is enabled.
|
||||||
|
|
||||||
### Parameters
|
### Parameters
|
||||||
|
|
||||||
@@ -404,7 +403,7 @@ $ curl \
|
|||||||
| :----- | :-------------------------------------------------- |
|
| :----- | :-------------------------------------------------- |
|
||||||
| `POST` | `/kmip/scope/:scope/role/:role/credential/generate` |
|
| `POST` | `/kmip/scope/:scope/role/:role/credential/generate` |
|
||||||
|
|
||||||
Create a new client certificate tied to the given role and scope.
|
Create a new client certificate tied to the given role and scope.
|
||||||
This endpoint uses entropy augmentation to generate the client certificate
|
This endpoint uses entropy augmentation to generate the client certificate
|
||||||
if entropy augmentation is enabled.
|
if entropy augmentation is enabled.
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: KV - Secrets Engines - HTTP API
|
page_title: KV - Secrets Engines - HTTP API
|
||||||
sidebar_title: Key/Value
|
|
||||||
description: This is the API documentation for the Vault KV secrets engine.
|
description: This is the API documentation for the Vault KV secrets engine.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: KV - Secrets Engines - HTTP API
|
page_title: KV - Secrets Engines - HTTP API
|
||||||
sidebar_title: K/V Version 1
|
|
||||||
description: This is the API documentation for the Vault KV secrets engine.
|
description: This is the API documentation for the Vault KV secrets engine.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: KV - Secrets Engines - HTTP API
|
page_title: KV - Secrets Engines - HTTP API
|
||||||
sidebar_title: K/V Version 2
|
|
||||||
description: This is the API documentation for the Vault KV secrets engine.
|
description: This is the API documentation for the Vault KV secrets engine.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: MongoDB Atlas - Secrets Engines - HTTP API
|
page_title: MongoDB Atlas - Secrets Engines - HTTP API
|
||||||
sidebar_title: MongoDB Atlas
|
|
||||||
description: |-
|
description: |-
|
||||||
The MongoDB Atlas Secrets Engine for Vault generates MongoDB Atlas Programmatic API Keys dynamically.
|
The MongoDB Atlas Secrets Engine for Vault generates MongoDB Atlas Programmatic API Keys dynamically.
|
||||||
---
|
---
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: Nomad Secret Backend - HTTP API
|
page_title: Nomad Secret Backend - HTTP API
|
||||||
sidebar_title: Nomad
|
|
||||||
description: This is the API documentation for the Vault Nomad secret backend.
|
description: This is the API documentation for the Vault Nomad secret backend.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: OpenLDAP - Secrets Engines - HTTP API
|
page_title: OpenLDAP - Secrets Engines - HTTP API
|
||||||
sidebar_title: OpenLDAP
|
|
||||||
description: This is the API documentation for the Vault OpenLDAP secrets engine.
|
description: This is the API documentation for the Vault OpenLDAP secrets engine.
|
||||||
---
|
---
|
||||||
|
|
||||||
@@ -226,7 +225,6 @@ $ curl \
|
|||||||
http://127.0.0.1:8200/v1/openldap/static-cred/hashicorp
|
http://127.0.0.1:8200/v1/openldap/static-cred/hashicorp
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|
||||||
#### Sample Get Response
|
#### Sample Get Response
|
||||||
|
|
||||||
```json
|
```json
|
||||||
@@ -266,8 +264,8 @@ OpenLDAP domain user account.
|
|||||||
|
|
||||||
#### Parameters
|
#### Parameters
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
| :------- | :------------------------- |
|
| :------- | :-------------------------- |
|
||||||
| `POST` | `/openldap/role/:role_name` |
|
| `POST` | `/openldap/role/:role_name` |
|
||||||
| `DELETE` | `/openldap/role/:role_name` |
|
| `DELETE` | `/openldap/role/:role_name` |
|
||||||
|
|
||||||
@@ -341,6 +339,7 @@ The `creation_ldif`, `deletion_ldif`, `rollback_ldif`, and `username_template` f
|
|||||||
Sample LDIF files:
|
Sample LDIF files:
|
||||||
|
|
||||||
`creation.ldif`:
|
`creation.ldif`:
|
||||||
|
|
||||||
```
|
```
|
||||||
dn: cn={{.Username}},ou=users,dc=learn,dc=example
|
dn: cn={{.Username}},ou=users,dc=learn,dc=example
|
||||||
objectClass: person
|
objectClass: person
|
||||||
@@ -372,7 +371,7 @@ Full Payload:
|
|||||||
```
|
```
|
||||||
|
|
||||||
-> Note: The LDIF statements may optionally be base64 encoded. If they are base64 encoded when creating/updating the
|
-> Note: The LDIF statements may optionally be base64 encoded. If they are base64 encoded when creating/updating the
|
||||||
role configuration, the decoded version will be returned from the `GET` endpoint.
|
role configuration, the decoded version will be returned from the `GET` endpoint.
|
||||||
|
|
||||||
#### Sample POST Request
|
#### Sample POST Request
|
||||||
|
|
||||||
@@ -386,8 +385,8 @@ $ curl \
|
|||||||
|
|
||||||
### Read Dynamic Role Configuration
|
### Read Dynamic Role Configuration
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
| ------ | -------------------------- |
|
| ------ | --------------------------- |
|
||||||
| `GET` | `/openldap/role/:role_name` |
|
| `GET` | `/openldap/role/:role_name` |
|
||||||
|
|
||||||
Retrieves a dynamic role's configuration.
|
Retrieves a dynamic role's configuration.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: PKI - Secrets Engines - HTTP API
|
page_title: PKI - Secrets Engines - HTTP API
|
||||||
sidebar_title: PKI
|
|
||||||
description: This is the API documentation for the Vault PKI secrets engine.
|
description: This is the API documentation for the Vault PKI secrets engine.
|
||||||
---
|
---
|
||||||
|
|
||||||
@@ -1605,30 +1604,27 @@ $ curl \
|
|||||||
|
|
||||||
# Cluster Scalability
|
# Cluster Scalability
|
||||||
|
|
||||||
Most non-introspection operations in the PKI secrets engine require a write to
|
Most non-introspection operations in the PKI secrets engine require a write to
|
||||||
storage, and so are forwarded to the cluster's active node for execution.
|
storage, and so are forwarded to the cluster's active node for execution.
|
||||||
This table outlines which operations can be executed on performance standbys
|
This table outlines which operations can be executed on performance standbys
|
||||||
and thus scale horizontally.
|
and thus scale horizontally.
|
||||||
|
|
||||||
| Path | Operations |
|
| Path | Operations |
|
||||||
| --------------------------- | ------------------- |
|
| --------------------------- | -------------------- |
|
||||||
| ca[/pem] | Read |
|
| ca[/pem] | Read |
|
||||||
| cert/<em>serial-number</em> | Read |
|
| cert/<em>serial-number</em> | Read |
|
||||||
| cert/ca_chain | Read |
|
| cert/ca_chain | Read |
|
||||||
| config/crl | Read |
|
| config/crl | Read |
|
||||||
| certs | List |
|
| certs | List |
|
||||||
| ca_chain | Read |
|
| ca_chain | Read |
|
||||||
| crl[/pem] | Read |
|
| crl[/pem] | Read |
|
||||||
| crl/pem | Read |
|
| crl/pem | Read |
|
||||||
| issue | Update <sup>*</sup> |
|
| issue | Update <sup>\*</sup> |
|
||||||
| revoked/* | Read, List |
|
| revoked/\* | Read, List |
|
||||||
| sign | Update <sup>*</sup> |
|
| sign | Update <sup>\*</sup> |
|
||||||
| sign-verbatim | Update <sup>*</sup> |
|
| sign-verbatim | Update <sup>\*</sup> |
|
||||||
|
|
||||||
\* Only if the corresponding role has `no_store` set to true and `generate_lease`
|
\* Only if the corresponding role has `no_store` set to true and `generate_lease`
|
||||||
set to false. If `generate_lease` is true the lease creation will be forwarded to
|
set to false. If `generate_lease` is true the lease creation will be forwarded to
|
||||||
the active node; if `no_store` is false the entire request will be forwarded to
|
the active node; if `no_store` is false the entire request will be forwarded to
|
||||||
the active node.
|
the active node.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: RabbitMQ - Secrets Engines - HTTP API
|
page_title: RabbitMQ - Secrets Engines - HTTP API
|
||||||
sidebar_title: RabbitMQ
|
|
||||||
description: This is the API documentation for the Vault RabbitMQ secrets engine.
|
description: This is the API documentation for the Vault RabbitMQ secrets engine.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: SSH - Secrets Engines - HTTP API
|
page_title: SSH - Secrets Engines - HTTP API
|
||||||
sidebar_title: SSH
|
|
||||||
description: This is the API documentation for the Vault SSH secrets engine.
|
description: This is the API documentation for the Vault SSH secrets engine.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: Terraform Cloud Secret Backend - HTTP API
|
page_title: Terraform Cloud Secret Backend - HTTP API
|
||||||
sidebar_title: Terraform Cloud
|
|
||||||
description: This is the API documentation for the Vault Terraform Cloud secret backend.
|
description: This is the API documentation for the Vault Terraform Cloud secret backend.
|
||||||
---
|
---
|
||||||
|
|
||||||
@@ -21,8 +20,8 @@ This endpoint configures the access information for Terraform Cloud. This access
|
|||||||
information is used so that Vault can communicate with Terraform Cloud and generate
|
information is used so that Vault can communicate with Terraform Cloud and generate
|
||||||
Terraform Cloud tokens.
|
Terraform Cloud tokens.
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
| :----- | :--------------------- |
|
| :----- | :------------------ |
|
||||||
| `POST` | `/terraform/config` |
|
| `POST` | `/terraform/config` |
|
||||||
|
|
||||||
### Parameters
|
### Parameters
|
||||||
@@ -35,7 +34,6 @@ Terraform Cloud tokens.
|
|||||||
use. This token must have the needed permissions to manage all Organization,
|
use. This token must have the needed permissions to manage all Organization,
|
||||||
Team, and User tokens desired for this mount.
|
Team, and User tokens desired for this mount.
|
||||||
|
|
||||||
|
|
||||||
### Sample Payload
|
### Sample Payload
|
||||||
|
|
||||||
```json
|
```json
|
||||||
@@ -59,8 +57,8 @@ $ curl \
|
|||||||
|
|
||||||
This endpoint queries for information about the Terraform Cloud connection.
|
This endpoint queries for information about the Terraform Cloud connection.
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
| :----- | :--------------------- |
|
| :----- | :------------------ |
|
||||||
| `GET` | `/terraform/config` |
|
| `GET` | `/terraform/config` |
|
||||||
|
|
||||||
### Sample Request
|
### Sample Request
|
||||||
@@ -80,19 +78,18 @@ $ curl \
|
|||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|
||||||
## Create/Update Role
|
## Create/Update Role
|
||||||
|
|
||||||
This endpoint creates or updates the Terraform Cloud role definition in Vault.
|
This endpoint creates or updates the Terraform Cloud role definition in Vault.
|
||||||
If the role does not exist, it will be created. If the role already exists, it
|
If the role does not exist, it will be created. If the role already exists, it
|
||||||
will receive updated attributes.
|
will receive updated attributes.
|
||||||
|
|
||||||
Terraform Cloud offers three distinct types of API tokens with varying level of
|
Terraform Cloud offers three distinct types of API tokens with varying level of
|
||||||
access: Organizations, Teams, and Users. A Vault Role can manage a single type
|
access: Organizations, Teams, and Users. A Vault Role can manage a single type
|
||||||
of API token at a time, determined by how it is configured:
|
of API token at a time, determined by how it is configured:
|
||||||
|
|
||||||
- To manage an Organization API token, provide the organization
|
- To manage an Organization API token, provide the organization
|
||||||
name with the `organization` parameter
|
name with the `organization` parameter
|
||||||
- To manage a Team API token, provide the `team_id` parameter
|
- To manage a Team API token, provide the `team_id` parameter
|
||||||
- To manage a User API token, provide a `user_id` parameter
|
- To manage a User API token, provide a `user_id` parameter
|
||||||
|
|
||||||
@@ -107,9 +104,8 @@ Please see the [Terraform Cloud API
|
|||||||
Token documentation for more
|
Token documentation for more
|
||||||
information](https://www.terraform.io/docs/cloud/users-teams-organizations/api-tokens.html).
|
information](https://www.terraform.io/docs/cloud/users-teams-organizations/api-tokens.html).
|
||||||
|
|
||||||
|
| Method | Path |
|
||||||
| Method | Path |
|
| :----- | :---------------------- |
|
||||||
| :----- | :------------------ |
|
|
||||||
| `POST` | `/terraform/role/:name` |
|
| `POST` | `/terraform/role/:name` |
|
||||||
|
|
||||||
### Parameters
|
### Parameters
|
||||||
@@ -119,7 +115,7 @@ information](https://www.terraform.io/docs/cloud/users-teams-organizations/api-t
|
|||||||
|
|
||||||
- `organization` `(string: "")` – Organization name to manage the single API
|
- `organization` `(string: "")` – Organization name to manage the single API
|
||||||
token. Organizations can only have a single active API token at any given
|
token. Organizations can only have a single active API token at any given
|
||||||
time. Conflicts with `user_id`.
|
time. Conflicts with `user_id`.
|
||||||
|
|
||||||
- `team_id` `(string: "")` – Team ID to manage the single API token. Teams can
|
- `team_id` `(string: "")` – Team ID to manage the single API token. Teams can
|
||||||
only have a single active API token at any given time. Conflicts with
|
only have a single active API token at any given time. Conflicts with
|
||||||
@@ -136,7 +132,6 @@ information](https://www.terraform.io/docs/cloud/users-teams-organizations/api-t
|
|||||||
as a string duration with a time suffix like `"30s"` or `"1h"` or as seconds. If not
|
as a string duration with a time suffix like `"30s"` or `"1h"` or as seconds. If not
|
||||||
provided, the default Vault Max TTL is used. Only applies to User API tokens.
|
provided, the default Vault Max TTL is used. Only applies to User API tokens.
|
||||||
|
|
||||||
|
|
||||||
### Sample Payload
|
### Sample Payload
|
||||||
|
|
||||||
To create a Vault role to manage a Terraform Cloud User tokens
|
To create a Vault role to manage a Terraform Cloud User tokens
|
||||||
@@ -144,8 +139,8 @@ To create a Vault role to manage a Terraform Cloud User tokens
|
|||||||
```json
|
```json
|
||||||
{
|
{
|
||||||
"user_id": "user-glhf1234",
|
"user_id": "user-glhf1234",
|
||||||
"ttl":"1h",
|
"ttl": "1h",
|
||||||
"max_ttl":"24h",
|
"max_ttl": "24h"
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
@@ -164,8 +159,8 @@ $ curl \
|
|||||||
This endpoint queries for information about a Terraform Cloud role with the given name.
|
This endpoint queries for information about a Terraform Cloud role with the given name.
|
||||||
If no role exists with that name, a 404 is returned.
|
If no role exists with that name, a 404 is returned.
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
| :----- | :------------------ |
|
| :----- | :---------------------- |
|
||||||
| `GET` | `/terraform/role/:name` |
|
| `GET` | `/terraform/role/:name` |
|
||||||
|
|
||||||
### Parameters
|
### Parameters
|
||||||
@@ -190,7 +185,7 @@ $ curl \
|
|||||||
"name": "tfuser",
|
"name": "tfuser",
|
||||||
"ttl": 3600,
|
"ttl": 3600,
|
||||||
"user_id": "user-glhf1234"
|
"user_id": "user-glhf1234"
|
||||||
},
|
}
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
@@ -198,8 +193,8 @@ $ curl \
|
|||||||
|
|
||||||
This endpoint lists all existing roles in the backend.
|
This endpoint lists all existing roles in the backend.
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
| :----- | :---------------------- |
|
| :----- | :-------------------------- |
|
||||||
| `LIST` | `/terraform/role` |
|
| `LIST` | `/terraform/role` |
|
||||||
| `GET` | `/terraform/role?list=true` |
|
| `GET` | `/terraform/role?list=true` |
|
||||||
|
|
||||||
@@ -227,8 +222,8 @@ $ curl \
|
|||||||
This endpoint deletes a Terraform Cloud role with the given name. Even if the role does
|
This endpoint deletes a Terraform Cloud role with the given name. Even if the role does
|
||||||
not exist, this endpoint will still return a successful response.
|
not exist, this endpoint will still return a successful response.
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
| :------- | :------------------ |
|
| :------- | :---------------------- |
|
||||||
| `DELETE` | `/terraform/role/:name` |
|
| `DELETE` | `/terraform/role/:name` |
|
||||||
|
|
||||||
### Parameters
|
### Parameters
|
||||||
@@ -251,9 +246,8 @@ This endpoint rotates the credentials for a Terraform Cloud role that manages an
|
|||||||
Organization or Team. This endpoint is only valid for those roles; attempting to
|
Organization or Team. This endpoint is only valid for those roles; attempting to
|
||||||
rotate a role that manages user tokens will result in an error.
|
rotate a role that manages user tokens will result in an error.
|
||||||
|
|
||||||
|
| Method | Path |
|
||||||
| Method | Path |
|
| :----- | :----------------------------- |
|
||||||
| :------- | :------------------ |
|
|
||||||
| `POST` | `/terraform/rotate-role/:name` |
|
| `POST` | `/terraform/rotate-role/:name` |
|
||||||
|
|
||||||
### Parameters
|
### Parameters
|
||||||
@@ -277,8 +271,8 @@ definition. For Organization and Team roles, the same API token is returned
|
|||||||
until the token is rotated with `rotate-role`. For User roles, a new token is
|
until the token is rotated with `rotate-role`. For User roles, a new token is
|
||||||
generated with each request.
|
generated with each request.
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
| :----- | :------------------- |
|
| :----- | :----------------------- |
|
||||||
| `GET` | `/terraform/creds/:name` |
|
| `GET` | `/terraform/creds/:name` |
|
||||||
|
|
||||||
### Parameters
|
### Parameters
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: TOTP - Secrets Engines - HTTP API
|
page_title: TOTP - Secrets Engines - HTTP API
|
||||||
sidebar_title: TOTP
|
|
||||||
description: This is the API documentation for the Vault TOTP secrets engine.
|
description: This is the API documentation for the Vault TOTP secrets engine.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: Transform - Secrets Engines - HTTP API
|
page_title: Transform - Secrets Engines - HTTP API
|
||||||
sidebar_title: Transform <sup>ENTERPRISE</sup>
|
|
||||||
description: This is the API documentation for the Transform secrets engine.
|
description: This is the API documentation for the Transform secrets engine.
|
||||||
---
|
---
|
||||||
|
|
||||||
@@ -211,8 +210,8 @@ This endpoint creates or updates an FPE transformation with the given `name`. If
|
|||||||
transformation with the name does not exist, it will be created. If the
|
transformation with the name does not exist, it will be created. If the
|
||||||
transformation exists, it will be updated with the new attributes.
|
transformation exists, it will be updated with the new attributes.
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
| :----- | :------------------------------------ |
|
| :----- | :------------------------------------- |
|
||||||
| `POST` | `/transform/transformations/fpe/:name` |
|
| `POST` | `/transform/transformations/fpe/:name` |
|
||||||
|
|
||||||
### Parameters
|
### Parameters
|
||||||
@@ -260,8 +259,8 @@ This endpoint creates or updates a masking transformation with the given `name`.
|
|||||||
transformation with the name does not exist, it will be created. If the
|
transformation with the name does not exist, it will be created. If the
|
||||||
transformation exists, it will be updated with the new attributes.
|
transformation exists, it will be updated with the new attributes.
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
| :----- | :---------------------------------------- |
|
| :----- | :----------------------------------------- |
|
||||||
| `POST` | `/transform/transformations/masking/:name` |
|
| `POST` | `/transform/transformations/masking/:name` |
|
||||||
|
|
||||||
### Parameters
|
### Parameters
|
||||||
@@ -310,8 +309,8 @@ This endpoint creates or updates a tokenization transformation with the given `n
|
|||||||
transformation with the name does not exist, it will be created. If the
|
transformation with the name does not exist, it will be created. If the
|
||||||
transformation exists, it will be updated with the new attributes.
|
transformation exists, it will be updated with the new attributes.
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
| :----- | :--------------------------------------------- |
|
| :----- | :---------------------------------------------- |
|
||||||
| `POST` | `/transform/transformations/tokenization/:name` |
|
| `POST` | `/transform/transformations/tokenization/:name` |
|
||||||
|
|
||||||
### Parameters
|
### Parameters
|
||||||
@@ -361,8 +360,8 @@ $ curl \
|
|||||||
|
|
||||||
This endpoint queries an existing transformation by the given name.
|
This endpoint queries an existing transformation by the given name.
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
| :----- | :-------------------------------- |
|
| :----- | :--------------------------------- |
|
||||||
| `GET` | `/transform/transformations/:name` |
|
| `GET` | `/transform/transformations/:name` |
|
||||||
|
|
||||||
- `name` `(string: <required>)` –
|
- `name` `(string: <required>)` –
|
||||||
@@ -420,8 +419,8 @@ $ curl
|
|||||||
|
|
||||||
This endpoint deletes an existing transformation by the given name.
|
This endpoint deletes an existing transformation by the given name.
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
| :------- | :-------------------------------- |
|
| :------- | :--------------------------------- |
|
||||||
| `DELETE` | `/transform/transformations/:name` |
|
| `DELETE` | `/transform/transformations/:name` |
|
||||||
|
|
||||||
### Parameters
|
### Parameters
|
||||||
@@ -705,7 +704,7 @@ The database user configured here should only have permission to `SELECT`,
|
|||||||
- `type` `(string: <required>)` -
|
- `type` `(string: <required>)` -
|
||||||
Specifies the type of store. Currently only `sql` is supported.
|
Specifies the type of store. Currently only `sql` is supported.
|
||||||
|
|
||||||
- `driver` `(string: <required>)` -
|
- `driver` `(string: <required>)` -
|
||||||
Specifies the database driver to use, and thus which SQL database type.
|
Specifies the database driver to use, and thus which SQL database type.
|
||||||
Currently the supported options are `postgres` or `mysql`
|
Currently the supported options are `postgres` or `mysql`
|
||||||
|
|
||||||
@@ -714,9 +713,10 @@ The database user configured here should only have permission to `SELECT`,
|
|||||||
|
|
||||||
- `connection_string` `(string: <required>)` -
|
- `connection_string` `(string: <required>)` -
|
||||||
A database connection string with template slots for username and password that
|
A database connection string with template slots for username and password that
|
||||||
Vault will use for locating and connecting to a database. Each
|
Vault will use for locating and connecting to a database. Each
|
||||||
database driver type has a different syntax for its connection strings.
|
database driver type has a different syntax for its connection strings.
|
||||||
> When using MySQL, make sure to append `?parseTime=true` to enable timestamp parsing.
|
|
||||||
|
> When using MySQL, make sure to append `?parseTime=true` to enable timestamp parsing.
|
||||||
|
|
||||||
- `username`: `(string: <required>)` -
|
- `username`: `(string: <required>)` -
|
||||||
The username value to use when connecting to the database.
|
The username value to use when connecting to the database.
|
||||||
@@ -1360,21 +1360,21 @@ $ curl \
|
|||||||
|
|
||||||
## Snapshot Tokenization State
|
## Snapshot Tokenization State
|
||||||
|
|
||||||
This endpoint starts or continues retrieving a snapshot of the stored
|
This endpoint starts or continues retrieving a snapshot of the stored
|
||||||
state of a tokenization transform. This state is protected as it is
|
state of a tokenization transform. This state is protected as it is
|
||||||
in the underlying store, and so is safe for storage or transport. Snapshots
|
in the underlying store, and so is safe for storage or transport. Snapshots
|
||||||
may be used for backup purposes or to migrate from one store to another.
|
may be used for backup purposes or to migrate from one store to another.
|
||||||
If more than one store is configured for a tokenization transform, the
|
If more than one store is configured for a tokenization transform, the
|
||||||
snapshot data contains the contents of the first store.
|
snapshot data contains the contents of the first store.
|
||||||
|
|
||||||
Since more values may exist than can be returned in a single call, if
|
Since more values may exist than can be returned in a single call, if
|
||||||
a snapshot has more values, the response will contain the `continuation`
|
a snapshot has more values, the response will contain the `continuation`
|
||||||
field, an opaque value that if provided on a subsequent call will resume
|
field, an opaque value that if provided on a subsequent call will resume
|
||||||
snapshotting at the next value. If absent, the end of the snapshot has
|
snapshotting at the next value. If absent, the end of the snapshot has
|
||||||
been reached.
|
been reached.
|
||||||
|
|
||||||
Snapshots are guaranteed to contain the values present at the time
|
Snapshots are guaranteed to contain the values present at the time
|
||||||
of the first call to start the snapshot. Values tokenized after the
|
of the first call to start the snapshot. Values tokenized after the
|
||||||
snapshot began may or may not be included.
|
snapshot began may or may not be included.
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
@@ -1390,7 +1390,7 @@ snapshot began may or may not be included.
|
|||||||
The maximum number of tokenized value states to return on this call.
|
The maximum number of tokenized value states to return on this call.
|
||||||
|
|
||||||
- `continuation` `string: ""` -
|
- `continuation` `string: ""` -
|
||||||
If absent or empty, a new snapshot is started. If present, the
|
If absent or empty, a new snapshot is started. If present, the
|
||||||
snapshot should continue at the next available value.
|
snapshot should continue at the next available value.
|
||||||
|
|
||||||
### Sample Payload
|
### Sample Payload
|
||||||
@@ -1401,6 +1401,7 @@ snapshot began may or may not be included.
|
|||||||
"continuation": "2F1nUpUKMZUBnwQ77qByt1"
|
"continuation": "2F1nUpUKMZUBnwQ77qByt1"
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
### Sample Request
|
### Sample Request
|
||||||
|
|
||||||
```shell-session
|
```shell-session
|
||||||
@@ -1429,7 +1430,7 @@ $ curl \
|
|||||||
## Restore Tokenization State
|
## Restore Tokenization State
|
||||||
|
|
||||||
This endpoint restores previously snapshotted tokenization state values
|
This endpoint restores previously snapshotted tokenization state values
|
||||||
to the underlying store(s) of a tokenization transform. Calls to this
|
to the underlying store(s) of a tokenization transform. Calls to this
|
||||||
endpoint are idempotent, so multiple outputs from a snapshot run can
|
endpoint are idempotent, so multiple outputs from a snapshot run can
|
||||||
be applied via restore in any order and duplicates will not cause a problem.
|
be applied via restore in any order and duplicates will not cause a problem.
|
||||||
|
|
||||||
@@ -1448,18 +1449,18 @@ into an `exportable` mode store and vice versa.
|
|||||||
- `values` `([]string: <required>)` -
|
- `values` `([]string: <required>)` -
|
||||||
Any number of tokenization state values from a previous snapshot call.
|
Any number of tokenization state values from a previous snapshot call.
|
||||||
|
|
||||||
|
|
||||||
### Sample Payload
|
### Sample Payload
|
||||||
|
|
||||||
```json
|
```json
|
||||||
{
|
{
|
||||||
"values": [
|
"values": [
|
||||||
"CiDiVGJaXlcS0ky4mRVvfLdxk7FWh8ATcFMSbQRtWCs/HxJ8CAESIGQH2oukpwPAFoK2SaKUcYAxrnxtvJn7n5d3dWx2eCLcIkZ3FXcQKu5+Bnl4NzOSL2ZkU5t9OOpQOMg0lwsMkq0Vm98ANGC9RabaP2ePddzTkD58GBvsVetYVnqHQFZufQ2pw/EXkFIWMg4I4KvX4vf/////ARCgHw==",
|
"CiDiVGJaXlcS0ky4mRVvfLdxk7FWh8ATcFMSbQRtWCs/HxJ8CAESIGQH2oukpwPAFoK2SaKUcYAxrnxtvJn7n5d3dWx2eCLcIkZ3FXcQKu5+Bnl4NzOSL2ZkU5t9OOpQOMg0lwsMkq0Vm98ANGC9RabaP2ePddzTkD58GBvsVetYVnqHQFZufQ2pw/EXkFIWMg4I4KvX4vf/////ARCgHw==",
|
||||||
"CiADFWL7/equiN83oWl/MvYWRYQLvjUxDVvoxK1Ghw4drBJ8CAESIOWPEUBUq4ATLY83P3vLknmWlKYjKVwTgB1z7hYGdyHPIka2nyOX1z3D4pMsZWwMFJlNBiT1Lb4MMZ6CUbclykLw/LBG5GTWQbOXx/3Vd54RAA82382mUem8Lu8BCMJYAa6vj/6aS9CLMg4I4KvX4vf/////ARCIJw==",
|
"CiADFWL7/equiN83oWl/MvYWRYQLvjUxDVvoxK1Ghw4drBJ8CAESIOWPEUBUq4ATLY83P3vLknmWlKYjKVwTgB1z7hYGdyHPIka2nyOX1z3D4pMsZWwMFJlNBiT1Lb4MMZ6CUbclykLw/LBG5GTWQbOXx/3Vd54RAA82382mUem8Lu8BCMJYAa6vj/6aS9CLMg4I4KvX4vf/////ARCIJw==",
|
||||||
"CiBf2+RqeiXmIHIh2fytEKOesTZ5U31D4BZ5xyhpuj3UfRJ8CAESIOWPEUBUq4ATLY83P3vLknmWlKYjKVwTgB1z7hYGdyHPIkbbU3ho25Om5AsuLUdsAPiEnyRGbtUUDxrvSoz5T1OVY363dN08cN8diJJro+AE/Zv4QMnq9Vbu8FD237YkLV1bnX/t29ZMMg4I4KvX4vf/////ARDwLg=="
|
"CiBf2+RqeiXmIHIh2fytEKOesTZ5U31D4BZ5xyhpuj3UfRJ8CAESIOWPEUBUq4ATLY83P3vLknmWlKYjKVwTgB1z7hYGdyHPIkbbU3ho25Om5AsuLUdsAPiEnyRGbtUUDxrvSoz5T1OVY363dN08cN8diJJro+AE/Zv4QMnq9Vbu8FD237YkLV1bnX/t29ZMMg4I4KvX4vf/////ARDwLg=="
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
### Sample Request
|
### Sample Request
|
||||||
|
|
||||||
```shell-session
|
```shell-session
|
||||||
@@ -1472,22 +1473,22 @@ $ curl \
|
|||||||
|
|
||||||
## Export Decoded Tokenization State
|
## Export Decoded Tokenization State
|
||||||
|
|
||||||
This endpoint starts or continues retrieving an export of tokenization
|
This endpoint starts or continues retrieving an export of tokenization
|
||||||
state, including the tokens and their decoded values. This call is only
|
state, including the tokens and their decoded values. This call is only
|
||||||
supported on tokenization stores configured with the `exportable` mapping
|
supported on tokenization stores configured with the `exportable` mapping
|
||||||
mode. Refer to the Tokenization
|
mode. Refer to the Tokenization
|
||||||
[documentation](../docs/secrets/transform/tokenization.mdx#security_considerations)
|
[documentation](../docs/secrets/transform/tokenization.mdx#security_considerations)
|
||||||
for when to use the `exportable` mapping mode.
|
for when to use the `exportable` mapping mode.
|
||||||
Decoded values are in Base64 representation.
|
Decoded values are in Base64 representation.
|
||||||
|
|
||||||
Since more values may exist than can be returned in a single call, if
|
Since more values may exist than can be returned in a single call, if
|
||||||
an export has more values, the response will contain the `continuation`
|
an export has more values, the response will contain the `continuation`
|
||||||
field, an opaque value that if provided on a subsequent call will resume
|
field, an opaque value that if provided on a subsequent call will resume
|
||||||
snapshotting at the next value. If absent, the end of the export has
|
snapshotting at the next value. If absent, the end of the export has
|
||||||
been reached.
|
been reached.
|
||||||
|
|
||||||
Exports are guaranteed to contain the values present at the time
|
Exports are guaranteed to contain the values present at the time
|
||||||
of the first call to start the export. Values tokenized after the
|
of the first call to start the export. Values tokenized after the
|
||||||
snapshot began may or may not be included.
|
snapshot began may or may not be included.
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
@@ -1503,7 +1504,7 @@ snapshot began may or may not be included.
|
|||||||
The maximum number of tokenized value states to return on this call.
|
The maximum number of tokenized value states to return on this call.
|
||||||
|
|
||||||
- `continuation` `string: ""` -
|
- `continuation` `string: ""` -
|
||||||
If absent or empty, a new export is started. If present, the
|
If absent or empty, a new export is started. If present, the
|
||||||
export should continue at the next available value.
|
export should continue at the next available value.
|
||||||
|
|
||||||
### Sample Payload
|
### Sample Payload
|
||||||
@@ -1514,6 +1515,7 @@ snapshot began may or may not be included.
|
|||||||
"continuation": "2F1nUpUKMZUBnwQ77qByt1"
|
"continuation": "2F1nUpUKMZUBnwQ77qByt1"
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
### Sample Request
|
### Sample Request
|
||||||
|
|
||||||
```shell-session
|
```shell-session
|
||||||
@@ -1528,7 +1530,7 @@ $ curl \
|
|||||||
|
|
||||||
```json
|
```json
|
||||||
{
|
{
|
||||||
"data": {
|
"data": {
|
||||||
"continuation": "4hELrrmGAwhHFjmMFny",
|
"continuation": "4hELrrmGAwhHFjmMFny",
|
||||||
"values": [
|
"values": [
|
||||||
{
|
{
|
||||||
@@ -1538,7 +1540,7 @@ $ curl \
|
|||||||
{
|
{
|
||||||
"plaintext": "dmFsdWUtMg==",
|
"plaintext": "dmFsdWUtMg==",
|
||||||
"token": "Q4tYgFXHxUNyMfqRW6fA82DYvMigwdf6JjATauyVzqx2SsmUShMhN5",
|
"token": "Q4tYgFXHxUNyMfqRW6fA82DYvMigwdf6JjATauyVzqx2SsmUShMhN5",
|
||||||
"expiration_time": "2021-03-15T00:31:10Z",
|
"expiration_time": "2021-03-15T00:31:10Z"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"plaintext": "dmFsdWUtMQ==",
|
"plaintext": "dmFsdWUtMQ==",
|
||||||
@@ -1551,14 +1553,13 @@ $ curl \
|
|||||||
|
|
||||||
## Rotate Tokenization Key
|
## Rotate Tokenization Key
|
||||||
|
|
||||||
This endpoint rotates the version of the named key. After rotation,
|
This endpoint rotates the version of the named key. After rotation,
|
||||||
new requests will be encoded with the new version of the key.
|
new requests will be encoded with the new version of the key.
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
| :----- | :---------------------------------------------------- |
|
| :----- | :---------------------------------------------------- |
|
||||||
| `POST` | `/transform/tokenization/keys/:transform_name/rotate` |
|
| `POST` | `/transform/tokenization/keys/:transform_name/rotate` |
|
||||||
|
|
||||||
|
|
||||||
### Parameters
|
### Parameters
|
||||||
|
|
||||||
- `transform_name` `(string: <required>)` –
|
- `transform_name` `(string: <required>)` –
|
||||||
@@ -1576,8 +1577,8 @@ $ curl \
|
|||||||
|
|
||||||
## Update Tokenization Key Config
|
## Update Tokenization Key Config
|
||||||
|
|
||||||
This endpoint allows the minimum key version to be set for
|
This endpoint allows the minimum key version to be set for
|
||||||
decode operations.
|
decode operations.
|
||||||
Only valid for tokenization transformations.
|
Only valid for tokenization transformations.
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
@@ -1592,17 +1593,17 @@ Only valid for tokenization transformations.
|
|||||||
|
|
||||||
- `min_decryption_version` `(int: <optional>)` –
|
- `min_decryption_version` `(int: <optional>)` –
|
||||||
Specifies the minimum key version that vault can use to decode values for the
|
Specifies the minimum key version that vault can use to decode values for the
|
||||||
corresponding transform.
|
corresponding transform.
|
||||||
|
|
||||||
### Sample Payload
|
### Sample Payload
|
||||||
|
|
||||||
```json
|
```json
|
||||||
[
|
[
|
||||||
{
|
{
|
||||||
"min_decryption_version": 1,
|
"min_decryption_version": 1
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
```
|
```
|
||||||
|
|
||||||
### Sample Request
|
### Sample Request
|
||||||
|
|
||||||
@@ -1619,10 +1620,9 @@ $ curl \
|
|||||||
List all tokenization keys.
|
List all tokenization keys.
|
||||||
Only valid for tokenization transformations.
|
Only valid for tokenization transformations.
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
| :----- | :------------------------------- |
|
| :----- | :------------------------------ |
|
||||||
| `LIST` | `/transform/tokenization/keys/` |
|
| `LIST` | `/transform/tokenization/keys/` |
|
||||||
|
|
||||||
|
|
||||||
### Sample Request
|
### Sample Request
|
||||||
|
|
||||||
@@ -1687,7 +1687,7 @@ Once trimmed, previous versions of the key cannot be recovered.
|
|||||||
of the URL.
|
of the URL.
|
||||||
|
|
||||||
- `min_available_version` `(int: <required>)` –
|
- `min_available_version` `(int: <required>)` –
|
||||||
Specifies minimum key version available for use for this transform. All versions below
|
Specifies minimum key version available for use for this transform. All versions below
|
||||||
this will be permanently forgotten. Cannot be set below `min_decryption_version` or above
|
this will be permanently forgotten. Cannot be set below `min_decryption_version` or above
|
||||||
`latest_version`.
|
`latest_version`.
|
||||||
|
|
||||||
@@ -1708,4 +1708,3 @@ $ curl \
|
|||||||
--data @payload.json \
|
--data @payload.json \
|
||||||
http://127.0.0.1:8200/v1/transform//transform/tokenization/keys/:transform_name/trim
|
http://127.0.0.1:8200/v1/transform//transform/tokenization/keys/:transform_name/trim
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: Transit - Secrets Engines - HTTP API
|
page_title: Transit - Secrets Engines - HTTP API
|
||||||
sidebar_title: Transit
|
|
||||||
description: This is the API documentation for the Vault Transit secrets engine.
|
description: This is the API documentation for the Vault Transit secrets engine.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: /sys/audit-hash - HTTP API
|
page_title: /sys/audit-hash - HTTP API
|
||||||
sidebar_title: <code>/sys/audit-hash</code>
|
|
||||||
description: |-
|
description: |-
|
||||||
The `/sys/audit-hash` endpoint is used to hash data using an audit device's
|
The `/sys/audit-hash` endpoint is used to hash data using an audit device's
|
||||||
hash function and salt.
|
hash function and salt.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: /sys/audit - HTTP API
|
page_title: /sys/audit - HTTP API
|
||||||
sidebar_title: <code>/sys/audit</code>
|
|
||||||
description: The `/sys/audit` endpoint is used to enable and disable audit devices.
|
description: The `/sys/audit` endpoint is used to enable and disable audit devices.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: /sys/auth - HTTP API
|
page_title: /sys/auth - HTTP API
|
||||||
sidebar_title: <code>/sys/auth</code>
|
|
||||||
description: The `/sys/auth` endpoint is used to manage auth methods in Vault.
|
description: The `/sys/auth` endpoint is used to manage auth methods in Vault.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: /sys/capabilities-accessor - HTTP API
|
page_title: /sys/capabilities-accessor - HTTP API
|
||||||
sidebar_title: <code>/sys/capabilities-accessor</code>
|
|
||||||
description: |-
|
description: |-
|
||||||
The `/sys/capabilities-accessor` endpoint is used to fetch the capabilities of
|
The `/sys/capabilities-accessor` endpoint is used to fetch the capabilities of
|
||||||
the token associated with an accessor, on the given paths.
|
the token associated with an accessor, on the given paths.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: /sys/capabilities-self - HTTP API
|
page_title: /sys/capabilities-self - HTTP API
|
||||||
sidebar_title: <code>/sys/capabilities-self</code>
|
|
||||||
description: |-
|
description: |-
|
||||||
The `/sys/capabilities-self` endpoint is used to fetch the capabilities of
|
The `/sys/capabilities-self` endpoint is used to fetch the capabilities of
|
||||||
client token on the given paths.
|
client token on the given paths.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: /sys/capabilities - HTTP API
|
page_title: /sys/capabilities - HTTP API
|
||||||
sidebar_title: <code>/sys/capabilities</code>
|
|
||||||
description: |-
|
description: |-
|
||||||
The `/sys/capabilities` endpoint is used to fetch the capabilities of a token
|
The `/sys/capabilities` endpoint is used to fetch the capabilities of a token
|
||||||
on the given paths.
|
on the given paths.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: /sys/config/auditing - HTTP API
|
page_title: /sys/config/auditing - HTTP API
|
||||||
sidebar_title: <code>/sys/config/auditing</code>
|
|
||||||
description: The `/sys/config/auditing` endpoint is used to configure auditing settings.
|
description: The `/sys/config/auditing` endpoint is used to configure auditing settings.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: /sys/config/control-group - HTTP API
|
page_title: /sys/config/control-group - HTTP API
|
||||||
sidebar_title: <code>/sys/config/control-group</code>
|
|
||||||
description: The '/sys/config/control-group' endpoint configures control groups.
|
description: The '/sys/config/control-group' endpoint configures control groups.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: /sys/config/cors - HTTP API
|
page_title: /sys/config/cors - HTTP API
|
||||||
sidebar_title: <code>/sys/config/cors</code>
|
|
||||||
description: >-
|
description: >-
|
||||||
The '/sys/config/cors' endpoint configures how the Vault server responds to
|
The '/sys/config/cors' endpoint configures how the Vault server responds to
|
||||||
cross-origin requests.
|
cross-origin requests.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: /sys/config/state - HTTP API
|
page_title: /sys/config/state - HTTP API
|
||||||
sidebar_title: <code>/sys/config/state</code>
|
|
||||||
description: The '/sys/config/state' endpoint is used to retrieve the configuration state.
|
description: The '/sys/config/state' endpoint is used to retrieve the configuration state.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: /sys/config/ui - HTTP API
|
page_title: /sys/config/ui - HTTP API
|
||||||
sidebar_title: <code>/sys/config/ui</code>
|
|
||||||
description: The '/sys/config/ui' endpoint configures the UI.
|
description: The '/sys/config/ui' endpoint configures the UI.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: /sys/control-group - HTTP API
|
page_title: /sys/control-group - HTTP API
|
||||||
sidebar_title: <code>/sys/control-group</code>
|
|
||||||
description: The '/sys/control-group' endpoint handles the Control Group workflow.
|
description: The '/sys/control-group' endpoint handles the Control Group workflow.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: /sys/generate-recovery-token - HTTP API
|
page_title: /sys/generate-recovery-token - HTTP API
|
||||||
sidebar_title: <code>/sys/generate-recovery-token</code>
|
|
||||||
description: |-
|
description: |-
|
||||||
The `/sys/generate-recovery-token/` endpoints are used to create a new
|
The `/sys/generate-recovery-token/` endpoints are used to create a new
|
||||||
recovery token for Vault. They are only active in recovery mode.
|
recovery token for Vault. They are only active in recovery mode.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: /sys/generate-root - HTTP API
|
page_title: /sys/generate-root - HTTP API
|
||||||
sidebar_title: <code>/sys/generate-root</code>
|
|
||||||
description: |-
|
description: |-
|
||||||
The `/sys/generate-root/` endpoints are used to create a new root key for
|
The `/sys/generate-root/` endpoints are used to create a new root key for
|
||||||
Vault.
|
Vault.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: /sys/health - HTTP API
|
page_title: /sys/health - HTTP API
|
||||||
sidebar_title: <code>/sys/health</code>
|
|
||||||
description: The `/sys/health` endpoint is used to check the health status of Vault.
|
description: The `/sys/health` endpoint is used to check the health status of Vault.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: /sys/host-info - HTTP API
|
page_title: /sys/host-info - HTTP API
|
||||||
sidebar_title: <code>/sys/host-info</code>
|
|
||||||
description: The '/sys/host-info' endpoint is used to retrieve host information
|
description: The '/sys/host-info' endpoint is used to retrieve host information
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: System Backend - HTTP API
|
page_title: System Backend - HTTP API
|
||||||
sidebar_title: System Backend
|
|
||||||
description: |-
|
description: |-
|
||||||
The system backend is a default backend in Vault that is mounted at the `/sys`
|
The system backend is a default backend in Vault that is mounted at the `/sys`
|
||||||
endpoint. This endpoint cannot be disabled or moved, and is used to configure
|
endpoint. This endpoint cannot be disabled or moved, and is used to configure
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: /sys/init - HTTP API
|
page_title: /sys/init - HTTP API
|
||||||
sidebar_title: <code>/sys/init</code>
|
|
||||||
description: The `/sys/init` endpoint is used to initialize a new Vault.
|
description: The `/sys/init` endpoint is used to initialize a new Vault.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: /sys/internal/counters - HTTP API
|
page_title: /sys/internal/counters - HTTP API
|
||||||
sidebar_title: <code>/sys/internal/counters</code>
|
|
||||||
description: >-
|
description: >-
|
||||||
The `/sys/internal/counters` endpoints are used to return data about Vault usage.
|
The `/sys/internal/counters` endpoints are used to return data about Vault usage.
|
||||||
---
|
---
|
||||||
@@ -244,8 +243,8 @@ The time period is from the start of the current month, up until the time that t
|
|||||||
Note: the client count may be inaccurate in the moments following a Vault reboot, or leadership change.
|
Note: the client count may be inaccurate in the moments following a Vault reboot, or leadership change.
|
||||||
The estimate will stabilize when background loading of client data has completed.
|
The estimate will stabilize when background loading of client data has completed.
|
||||||
|
|
||||||
| Method | Path |
|
| Method | Path |
|
||||||
| :----- | :-------------------------------- |
|
| :----- | :---------------------------------------- |
|
||||||
| `GET` | `/sys/internal/counters/activity/monthly` |
|
| `GET` | `/sys/internal/counters/activity/monthly` |
|
||||||
|
|
||||||
### Sample Request
|
### Sample Request
|
||||||
@@ -268,7 +267,7 @@ $ curl \
|
|||||||
"data": {
|
"data": {
|
||||||
"distinct_entities": 100,
|
"distinct_entities": 100,
|
||||||
"non_entity_tokens": 120,
|
"non_entity_tokens": 120,
|
||||||
"clients": 220,
|
"clients": 220
|
||||||
},
|
},
|
||||||
"wrap_info": null,
|
"wrap_info": null,
|
||||||
"warnings": null,
|
"warnings": null,
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: /sys/internal/specs/openapi - HTTP API
|
page_title: /sys/internal/specs/openapi - HTTP API
|
||||||
sidebar_title: <code>/sys/internal/specs/openapi</code>
|
|
||||||
description: >-
|
description: >-
|
||||||
The `/sys/internal/specs/openapi` endpoint is used to generate an OpenAPI
|
The `/sys/internal/specs/openapi` endpoint is used to generate an OpenAPI
|
||||||
document of the mounted backends.
|
document of the mounted backends.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: /sys/internal/ui/feature-flags - HTTP API
|
page_title: /sys/internal/ui/feature-flags - HTTP API
|
||||||
sidebar_title: <code>/sys/internal/ui/feature-flags</code>
|
|
||||||
description: >-
|
description: >-
|
||||||
The `/sys/internal/ui/feature-flags` endpoint exposes feature flags to the UI.
|
The `/sys/internal/ui/feature-flags` endpoint exposes feature flags to the UI.
|
||||||
---
|
---
|
||||||
@@ -12,7 +11,7 @@ The `/sys/internal/ui/feature-flags` endpoint is used to expose feature flags
|
|||||||
to the UI so that it can change its behavior in response, even before a user logs in.
|
to the UI so that it can change its behavior in response, even before a user logs in.
|
||||||
|
|
||||||
This is currently only being used internally for the UI and is
|
This is currently only being used internally for the UI and is
|
||||||
an unauthenticated endpoint. Due to the nature of its intended usage, there is no
|
an unauthenticated endpoint. Due to the nature of its intended usage, there is no
|
||||||
guarantee on backwards compatibility for this endpoint.
|
guarantee on backwards compatibility for this endpoint.
|
||||||
|
|
||||||
## Get Enabled Feature Flags
|
## Get Enabled Feature Flags
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: /sys/internal/ui/mounts - HTTP API
|
page_title: /sys/internal/ui/mounts - HTTP API
|
||||||
sidebar_title: <code>/sys/internal/ui/mounts</code>
|
|
||||||
description: >-
|
description: >-
|
||||||
The `/sys/internal/ui/mounts` endpoint is used to manage mount listing
|
The `/sys/internal/ui/mounts` endpoint is used to manage mount listing
|
||||||
visibility.
|
visibility.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: /sys/key-status - HTTP API
|
page_title: /sys/key-status - HTTP API
|
||||||
sidebar_title: <code>/sys/key-status</code>
|
|
||||||
description: |-
|
description: |-
|
||||||
The `/sys/key-status` endpoint is used to query info about the current
|
The `/sys/key-status` endpoint is used to query info about the current
|
||||||
encryption key of Vault.
|
encryption key of Vault.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: /sys/leader - HTTP API
|
page_title: /sys/leader - HTTP API
|
||||||
sidebar_title: <code>/sys/leader</code>
|
|
||||||
description: |-
|
description: |-
|
||||||
The `/sys/leader` endpoint is used to check the high availability status and
|
The `/sys/leader` endpoint is used to check the high availability status and
|
||||||
current leader of Vault.
|
current leader of Vault.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: /sys/quotas/lease-count - HTTP API
|
page_title: /sys/quotas/lease-count - HTTP API
|
||||||
sidebar_title: <code>/sys/quotas/lease-count</code>
|
|
||||||
description: The `/sys/quotas/lease-count` endpoint is used to create, edit and delete lease count quotas.
|
description: The `/sys/quotas/lease-count` endpoint is used to create, edit and delete lease count quotas.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: /sys/leases - HTTP API
|
page_title: /sys/leases - HTTP API
|
||||||
sidebar_title: <code>/sys/leases</code>
|
|
||||||
description: The `/sys/leases` endpoints are used to view and manage leases.
|
description: The `/sys/leases` endpoints are used to view and manage leases.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: /sys/license - HTTP API
|
page_title: /sys/license - HTTP API
|
||||||
sidebar_title: <code>/sys/license</code>
|
|
||||||
description: |-
|
description: |-
|
||||||
The `/sys/license` endpoint is used to view and update the license used in
|
The `/sys/license` endpoint is used to view and update the license used in
|
||||||
Vault.
|
Vault.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: /sys/metrics - HTTP API
|
page_title: /sys/metrics - HTTP API
|
||||||
sidebar_title: <code>/sys/metrics</code>
|
|
||||||
description: The `/sys/metrics` endpoint is used to get telemetry metrics for Vault.
|
description: The `/sys/metrics` endpoint is used to get telemetry metrics for Vault.
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: /sys/mfa/method/duo - HTTP API
|
page_title: /sys/mfa/method/duo - HTTP API
|
||||||
sidebar_title: <code>/sys/mfa/method/duo</code>
|
|
||||||
description: >-
|
description: >-
|
||||||
The '/sys/mfa/method/duo' endpoint focuses on managing Duo MFA behaviors in
|
The '/sys/mfa/method/duo' endpoint focuses on managing Duo MFA behaviors in
|
||||||
Vault Enterprise.
|
Vault Enterprise.
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
---
|
---
|
||||||
layout: api
|
layout: api
|
||||||
page_title: /sys/mfa - HTTP API
|
page_title: /sys/mfa - HTTP API
|
||||||
sidebar_title: <code>/sys/mfa</code>
|
|
||||||
description: >-
|
description: >-
|
||||||
The '/sys/mfa' endpoint focuses on managing MFA behaviors in Vault Enterprise
|
The '/sys/mfa' endpoint focuses on managing MFA behaviors in Vault Enterprise
|
||||||
MFA.
|
MFA.
|
||||||
|
|||||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user