Commit Graph

105 Commits

Author SHA1 Message Date
hc-github-team-secure-vault-core
ed1d233f59 backport of commit 66b3e439d8 (#24219)
Co-authored-by: Scott Miller <smiller@hashicorp.com>
2023-11-21 10:01:08 -06:00
hc-github-team-secure-vault-core
89c37a738e Backport of [DOCS] Link to compliance page for vault instead of a pdf into release/1.13.x (#23932)
* backport of commit 95535193a4

* Empty commit to trigger rebuild
2023-11-01 18:00:57 +00:00
hc-github-team-secure-vault-core
f96de24e7c [VAULT-20073] Docs: update docs on Sentinel RGP group policy application (#23292) (#23340)
Co-authored-by: Kuba Wieczorek <kuba.wieczorek@hashicorp.com>
Co-authored-by: Violet Hynes <violet.hynes@hashicorp.com>
Co-authored-by: Peter Wilson <peter.wilson@hashicorp.com>
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2023-09-27 20:54:58 +00:00
Bianca Moreira
df758c4eaa Add administrative namespace docs (#22581) (#22792)
* Add administrative namespace section to namespaces docs
* Tag sys endpoints with restricted admin alert
---------

Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
2023-09-07 09:12:24 -04:00
hc-github-team-secure-vault-core
c48e3c23e8 backport of commit 5d769e8c8e (#22385)
Co-authored-by: Judith Malnick <judith@hashicorp.com>
2023-08-16 16:20:31 -07:00
Anton Averchenkov
46863a79a3 Backport #21426 (#21922) 2023-07-18 17:08:30 -04:00
hc-github-team-secure-vault-core
2b9a117721 Backport of VAULT-16905: Add upgrade description about non entity tokens into release/1.13.x (#21257)
* Automatic license utilization reporting (#20898)

* Add license utilization reporting doc

* Updated the title

* Incorporated the review feedback

* Update website/content/docs/enterprise/license/utilization-reporting.mdx

Co-authored-by: Mike Palmiotto <mike.palmiotto@hashicorp.com>

* Update website/content/docs/enterprise/license/utilization-reporting.mdx

Co-authored-by: Mike Palmiotto <mike.palmiotto@hashicorp.com>

* Fix the self reminder note

---------

Co-authored-by: Mike Palmiotto <mike.palmiotto@hashicorp.com>

* Add the payload parameter description (#21050)

* Add the payload parameter description

* Update website/content/docs/enterprise/license/utilization-reporting.mdx

Co-authored-by: Mike Palmiotto <mike.palmiotto@hashicorp.com>

* Update website/content/docs/enterprise/license/utilization-reporting.mdx

Co-authored-by: Mike Palmiotto <mike.palmiotto@hashicorp.com>

* Update website/content/docs/enterprise/license/utilization-reporting.mdx

Co-authored-by: Mike Palmiotto <mike.palmiotto@hashicorp.com>

* Adjust spacing

---------

Co-authored-by: Mike Palmiotto <mike.palmiotto@hashicorp.com>

* VAULT-16905: Add upgrade description about non entity tokens (#21245)

* add to utilization reporting

* add known issue

* fixes

* Add additional reporting versions to the documentation (#21304)

* add additional versions to the documentation

* pr fixes

* pr fixes

---------

Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
Co-authored-by: Mike Palmiotto <mike.palmiotto@hashicorp.com>
Co-authored-by: miagilepner <mia.epner@hashicorp.com>
2023-06-21 16:02:57 +00:00
hc-github-team-secure-vault-core
3ff5957c45 backport of commit bbcd3f1c1b (#21078)
Co-authored-by: Conor McCullough <103977699+conor-mccullough@users.noreply.github.com>
2023-06-08 15:05:45 +00:00
hc-github-team-secure-vault-core
7c8d7d0e94 backport of commit f1649fcde3 (#21072)
Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>
2023-06-08 10:14:13 -04:00
hc-github-team-secure-vault-core
130ce6d50f backport of commit 202c736119 (#20399)
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
2023-04-27 15:59:58 +00:00
hc-github-team-secure-vault-core
c110d97594 backport of commit bde372d602 (#20133)
Co-authored-by: Josh Black <raskchanky@users.noreply.github.com>
2023-04-13 00:48:32 +00:00
hc-github-team-secure-vault-core
a35fd50e6a Backport of Potentially Malicious Link into release/1.13.x (#20124)
* backport of commit 070082c2de

* Delete 20114.txt

---------

Co-authored-by: James King <james.r.king4@gmail.com>
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-04-12 21:21:49 +00:00
hc-github-team-secure-vault-core
850872e910 backport of commit fc783b00ab (#20120)
Co-authored-by: Matt Schultz <975680+schultz-is@users.noreply.github.com>
2023-04-12 18:56:43 +00:00
hc-github-team-secure-vault-core
0dfb8df627 backport of commit 3026f87b7b (#19801)
Co-authored-by: Victor Rodriguez <vrizo@hashicorp.com>
2023-03-28 16:12:44 -04:00
hc-github-team-secure-vault-core
217d7a995a backport of commit 3dbe94678f (#19675)
Co-authored-by: Luis (LT) Carbonell <lt.carbonell@hashicorp.com>
2023-03-22 17:05:55 +00:00
hc-github-team-secure-vault-core
7383b52b80 backport of commit 52bbf65ae7 (#19397)
Co-authored-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-02-28 15:47:52 +00:00
Bryce Kalow
79f6ff191c update learn links to point to developer locations (#19026) 2023-02-06 20:34:51 -08:00
Christopher Swenson
5735cdc1da docs: Remove XKS proxy TLS setup note (#18988)
The TLS settings should not need to be modified as xks-proxy should
generate the certificate and key itself for listening.
2023-02-03 13:22:04 -08:00
Alexander Scheel
1182f1d0c3 Add note about cluster deployments (#18855)
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2023-01-26 09:34:11 -05:00
Ashlee M Boyer
06df5b9d95 docs: Migrate link formats (#18696)
* Adding check-legacy-links-format workflow

* Adding test-link-rewrites workflow

* Updating docs-content-check-legacy-links-format hash

* Migrating links to new format

Co-authored-by: Kendall Strautman <kendallstrautman@gmail.com>
2023-01-25 16:12:15 -08:00
Violet Hynes
4b8bd15e28 VAULT-12491 Add docs for group policy config (#18616)
* VAULT-12491 Add docs for group policy config

* VAULT-12491 typo

* VAULT-12491 typo

* VAULT-12491 Update language a bit

* VAULT-12491 Update language a bit

* VAULT-12491 Update language a bit
2023-01-09 12:50:16 -05:00
Christopher Swenson
2a469d2c59 docs: Update PKCS#11 provider docs for XKS and RNG (#18597)
Better IV random generation is supported with XKS in the latest version
of the provider (0.1.3).
2023-01-05 09:42:52 -08:00
Christopher Swenson
5c7aadd2cb Update XKS docs to use AWS CLI (#18536)
And add note about requiring the zero IV until `vault-pkcs11-provider`
is released.
2022-12-22 23:20:21 +00:00
Geoffrey Grosenbach
6508de5a24 Remove mention of public Vault trial license form (#18280)
No longer in use.
2022-12-09 09:04:37 -05:00
Violet Hynes
672cdc0fdb VAULT-11510 Vault Agent can start listeners without caching (#18137)
* VAULT-11510 Vault Agent can start listeners without caching

* VAULT-11510 fix order of imports

* VAULT-11510 changelog

* VAULT-11510 typo and better switch

* VAULT-11510 update name

* VAULT-11510 New api_proxy stanza to configure API proxy

* VAULT-11510 First pass at API Proxy docs

* VAULT-11510 nav data

* VAULT-11510 typo

* VAULT-11510 docs update
2022-12-05 10:51:03 -05:00
Christopher Swenson
6057da5466 Add doc for AWS XKS Proxy with PKCS#11 Provider (#18149)
AWS announced [KMS External Key Store](https://aws.amazon.com/blogs/aws/announcing-aws-kms-external-key-store-xks/),
which we support using their reference [`xks-proxy`](https://github.com/aws-samples/aws-kms-xks-proxy)
software.
This adds a documentation page showing how to configure KMIP and the
PKCS#11 provider to to work with KMS and `xks-proxy`.

Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>
Co-authored-by: Theron Voran <tvoran@users.noreply.github.com>
2022-11-30 13:49:27 -08:00
Brian Shumate
322ebe5ae1 Docs: Enterprise TOTP updates (#18007)
* Docs: Enterprise TOTP updates

- Add note to TOTP about authenticator supported alogrithms
- Fix typos

* Path update
2022-11-17 08:50:01 -08:00
davidadeleon
28f091abe4 Add mTLS and Load Balancers section to Enterprise Replication Documentation (#17676)
* Adding mTLS and Load Balancers section

* Adding patch CLI docs to nav JSON
2022-10-27 12:14:24 -07:00
Bryce Kalow
88ee1d0e2c fixes more broken links (#17592) 2022-10-19 10:24:53 -04:00
Violet Hynes
11e7f1c624 VAULT-1603 add sys/quotas to root-only api path docs (#17496) 2022-10-11 15:09:29 -04:00
Christopher Swenson
61707d56d5 docs: Add docs for PKCS#11 provider (#17312)
docs: Add docs for PKCS#11 provider

The PKCS#11 provider is being released shortly.
This moves over the preliminary docs and cleans them up.

I added them as a new section under "Vault Enterprise" ->
"PKCS#11 Provider", but I am open to suggestion on if there is a
better place for them, e.g., "Platforms", or somehow merging
with "Vault Enterprise" -> "HSM"?

Co-authored-by: Theron Voran <tvoran@users.noreply.github.com>
Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>
2022-10-03 11:11:46 -07:00
Rachel Culpepper
6fc6bb1bb5 Add managed key docs for gcp (#17280)
* add managed key docs for gcp

* fix algorithm parameter

* add missing bracket
2022-09-22 14:44:21 -05:00
Bryce Kalow
fe3daa411a website: content updates for developer (#17035)
* Chore (dev portal): update learn nav data links  (#15515)

* Update docs-nav-data.json

* Update docs-nav-data.json

* website: fixes internal redirects (#15750)

* chore: remove duplicate overview item (#15805)

* Use `badge` for `<sup>` tags in nav data JSON files (#15928)

* Replacing <sup> tags with badge

* Adding type and color to badges

* fix broken links in vault docs (#15976)

* website: Update old learn links to redirect locations (#16047)

* update previews to render developer UI

* update redirects

* adjust content so it is backwards compat

Co-authored-by: HashiBot <62622282+hashibot-web@users.noreply.github.com>
Co-authored-by: Kendall Strautman <36613477+kendallstrautman@users.noreply.github.com>
Co-authored-by: Ashlee M Boyer <43934258+ashleemboyer@users.noreply.github.com>
2022-09-22 08:11:04 -07:00
conor-mccullough
b23763fa8d The "DELETE API" links to a nonexistent subsection of the /sys/license/status page from 1.11.x onwards. Not sure if the suggestion to restart the service should remain in this edit - I found a restart of all Vault servers cleared this message where other attempts failed - happy to remove it if preferred, though. (#16895) 2022-08-26 09:07:10 -07:00
Brian Shumate
d9e20520f8 Docs: Update Sentinel index (#11580)
- Remove doubled "tokens"

Co-authored-by: Mehdi Ahmadi <aphorise@gmail.com>
2022-08-26 11:28:18 -04:00
Chris Capurso
3bd7cc56eb update license FAQ docs with termination changes (#16634)
* update license FAQ docs with termination changes

* change intro statement

* change temp eval license issuance callout

* PR feedback

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>
2022-08-09 11:27:57 -07:00
Ikko Ashimine
6643d6fe40 Fix typo in managed-keys.mdx (#16578)
targetting -> targeting
2022-08-04 09:02:13 -04:00
Violet Hynes
2f50f88813 VAULT-6615 Update docs for 1.12 quota changes (#16381)
* VAULT-6615 Update docs for 1.12 quota changes

* VAULT-6615 Add info about globbing

* VAULT-6615 some small updates for role param

* Update website/content/docs/enterprise/lease-count-quotas.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Update website/content/api-docs/system/lease-count-quotas.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>
2022-08-02 15:37:56 -04:00
Alexander Scheel
0e33c2f7d4 Add KMIP CSPs + initial Seal Wrap list (#16515)
* Add note on KMIP EA usage

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Add wrapped parameters section to Seal Wrap docs

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-08-01 10:32:47 -04:00
Loann Le
3ca6036a4a updated note (#16372) 2022-07-19 16:52:41 -07:00
Alexander Scheel
bae0f15548 Back out panic message, add new warning to FIPS docs (#16243)
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-07-12 17:05:45 -04:00
Lucy Davinhart || Strawb System
ab1c833927 Clarification for local mounts in the context of DR (#16218)
* Clarification for local mounts in the context of DR

The docs were unclear on this point, so @russparsloe and I looked into it.

Local mounts are indeed replicated to DR secondaries.

This is the opposite of what it says on https://developer.hashicorp.com/vault/tutorials/enterprise/performance-replication#disaster-recovery 
> Local backend mounts are not replicated and their use will require existing DR mechanisms if DR is necessary in your implementation.
So that page will also need updating

* changelog

* fix changelog syntax for local mount with DR (#16218)
2022-07-12 10:17:12 -07:00
Alexander Scheel
dd92ccb729 Document additional FIPS restrictions (#16208)
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-06-30 16:14:07 -05:00
Lucy Davinhart || Strawb System
ea3a6b5a5c website: Update replication docs to mention Integrated Storage (#16063) 2022-06-21 10:55:15 -07:00
Alexander Scheel
a58c6ecd9f Add additional usage clarifications to EA docs (#16017)
- Document Transit and sys random endpoint in 1.11+
 - Document PKI and SSH CAs only, no leaves

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-06-16 13:56:22 -04:00
Alexander Scheel
93eaf3c860 Document limitations in FIPS 140-2 migrations (#16012)
Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-06-16 10:18:47 -04:00
Violet Hynes
cc3de02e18 VAULT-5095 Update docs to reflect that child namespaces do not inherit parent quotas (#15906)
* VAULT-5095 Update docs to reflect current behaviour

* Update website/content/api-docs/system/lease-count-quotas.mdx

Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>

* Update website/content/api-docs/system/rate-limit-quotas.mdx

Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>

Co-authored-by: Nick Cabatoff <ncabatoff@hashicorp.com>
2022-06-10 11:53:01 -04:00
Josh Black
55bc40235d Autopilot enterprise docs (#15589) 2022-06-07 14:32:45 -07:00
Alexander Scheel
bd4389a8b6 Add support notes, Entropy Augmentation notes, RH repo (#15843)
* Add support notes, Entropy Augmentation notes, RH repo

This adds a known-panic w.r.t. Entropy Augmentation due to restrictions
in how BoringCrypto's RNG works. Additionally adds the RH Access
container repository and adds a note about restricted support scenarios.

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>

* Wording changes per Scott

Signed-off-by: Alexander Scheel <alex.scheel@hashicorp.com>
2022-06-07 11:23:26 -04:00
amcbarnett
a94f5771a1 Update fips1402.mdx (#15598)
* Update fips1402.mdx

Added Link to new Compliance letter and details on what makes this different from Seal Wrap

* Update website/content/docs/enterprise/fips/fips1402.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Update website/content/docs/enterprise/fips/fips1402.mdx

Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>

* Update website/content/docs/enterprise/fips/fips1402.mdx

* Update website/content/docs/enterprise/fips/fips1402.mdx

* Update website/content/docs/enterprise/fips/fips1402.mdx

* Update website/content/docs/enterprise/fips/fips1402.mdx

* Update website/content/docs/enterprise/fips/fips1402.mdx

Co-authored-by: Alexander Scheel <alexander.m.scheel@gmail.com>
Co-authored-by: Loann Le <84412881+taoism4504@users.noreply.github.com>
2022-06-01 11:02:11 -04:00