mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-11-04 04:28:08 +00:00 
			
		
		
		
	* Adding check-legacy-links-format workflow * Adding test-link-rewrites workflow * Updating docs-content-check-legacy-links-format hash * Migrating links to new format Co-authored-by: Kendall Strautman <kendallstrautman@gmail.com>
		
			
				
	
	
		
			73 lines
		
	
	
		
			2.1 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
			
		
		
	
	
			73 lines
		
	
	
		
			2.1 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
---
 | 
						|
layout: docs
 | 
						|
page_title: UI - Configuration
 | 
						|
description: |-
 | 
						|
  Vault features a user interface (web interface) for interacting with Vault.
 | 
						|
  Easily create, read, update, and delete secrets, authenticate, unseal, and
 | 
						|
  more with the Vault UI.
 | 
						|
---
 | 
						|
 | 
						|
# Vault UI
 | 
						|
 | 
						|
Vault features a user interface (web interface) for interacting with Vault.
 | 
						|
Easily create, read, update, and delete secrets, authenticate, unseal, and
 | 
						|
more with the Vault UI.
 | 
						|
 | 
						|
-> The UI requires **Vault 0.10 or higher** or Vault Enterprise.
 | 
						|
 | 
						|
## Activating the Vault UI
 | 
						|
 | 
						|
The Vault UI is not activated by default. To activate the UI, set the `ui`
 | 
						|
configuration option in the Vault server configuration. Vault clients do not
 | 
						|
need to set this option, since they will not be serving the UI.
 | 
						|
 | 
						|
```hcl
 | 
						|
ui = true
 | 
						|
 | 
						|
listener "tcp" {
 | 
						|
  # ...
 | 
						|
}
 | 
						|
```
 | 
						|
 | 
						|
For more information, please see the
 | 
						|
[Vault configuration options](/vault/docs/configuration).
 | 
						|
 | 
						|
## Accessing the Vault UI
 | 
						|
 | 
						|
The UI runs on the same port as the Vault listener. As such, you must configure
 | 
						|
at least one `listener` stanza in order to access the UI.
 | 
						|
 | 
						|
```hcl
 | 
						|
listener "tcp" {
 | 
						|
  address = "10.0.1.35:8200"
 | 
						|
 | 
						|
  # If bound to localhost, the Vault UI is only
 | 
						|
  # accessible from the local machine!
 | 
						|
  # address = "127.0.0.1:8200"
 | 
						|
}
 | 
						|
```
 | 
						|
 | 
						|
In this case, the UI is accessible at the following URL from any machine on the
 | 
						|
subnet (provided no network firewalls are in place):
 | 
						|
 | 
						|
```text
 | 
						|
https://10.0.1.35:8200/ui/
 | 
						|
```
 | 
						|
 | 
						|
It is also accessible at any DNS entry that resolves to that IP address, such as
 | 
						|
the Consul service address (if using Consul):
 | 
						|
 | 
						|
```text
 | 
						|
https://vault.service.consul:8200/ui/
 | 
						|
```
 | 
						|
 | 
						|
### Note on TLS
 | 
						|
 | 
						|
When using TLS (recommended), the certificate must be valid for all DNS entries
 | 
						|
you will be accessing the Vault UI on, and any IP addresses on the SAN. If you
 | 
						|
are running Vault with a self-signed certificate, any browsers that access the
 | 
						|
Vault UI will need to have the root CA installed. Failure to do so may result in
 | 
						|
the browser displaying a warning that the site is "untrusted". It is highly
 | 
						|
recommended that client browsers accessing the Vault UI install the proper CA
 | 
						|
root for validation to reduce the chance of a MITM attack.
 |