Difference between revisions of "Hashicorp Vault"
Jump to navigation
Jump to search
Tags: Mobile web edit, Mobile edit |
Tags: Mobile web edit, Mobile edit |
||
Line 22: | Line 22: | ||
Manage [[GCP CKMS]] keys from within Vault. (1.0) | Manage [[GCP CKMS]] keys from within Vault. (1.0) | ||
− | Duo Multi-Factor Authentication support (0.3) | + | Duo Multi-Factor Authentication ([[MFA]]) support (0.3) |
== See also == | == See also == |
Revision as of 12:24, 28 March 2020
This article is a Draft. Help us to complete it.
2015
https://github.com/hashicorp/vault/blob/master/CHANGELOG.md
https://www.hashicorp.com/blog/vault-1-3/
vault debug (1.3)
- Raft Storage Backend
Support for storing Vault data in within Oracle Cloud Infrastructure Object Storage (1.3)
Database Static Credential Rotation (1.2)
InfluxDB Database Plugin (1.1)
Manage GCP CKMS keys from within Vault. (1.0)
Duo Multi-Factor Authentication (MFA) support (0.3)
See also
- Consul template
- Secrets: Kubernetes secrets,
ansible-vault
, Hashicorp Vault, AWS Secrets Manager, Google Secret Manager,git-crypt
, SOPS: Secrets OPerationS, Google Cloud Secret Manager, GitHub secret scanning alerts - GDPR
- HashiCorp: HCP, Terraform, Vault, Nomad, Vagrant, Sentinel, Consul, Packer, Waypoint, Boundary, Mitchell Hashimoto, Armon Dadgar
Advertising: