Skip to content

Adding support for auto-unseal with transit secrets engine #27

@phong2tran

Description

@phong2tran

Every time Vault server is restarted through the deployment update, or BOSH resurrector, it's started up in a seal state. Vault server has to be unsealed manually via Vault cli or api before it can be used. We're running CF in our own data center (on-premises) and it looked like we can use the auto-unseal with transit secrets engine (https://learn.hashicorp.com/vault/operations/autounseal-transit) for automation of unseal operation, but this feature is only available in Vault v1.1 and second Vault cluster deployment is also required.

  1. Is there a plan to upgrade Vault version to 1.1.3 any time soon?

  2. Add options for configuring seal stanza with transit secrets engine for a Vault cluster to replace the default Shamir's secret sharing option for protecting the master key:

seal "transit" {
address = "http://127.0.0.1:8200"
disable_renewal = "false"
key_name = "autounseal"
mount_path = "transit/"
tls_skip_verify = "true"
}

  1. Add options/scripts to configure a Vault cluster as auto-seal key provider.

https://learn.hashicorp.com/vault/operations/autounseal-transit#step-1-configure-auto-unseal-key-provider-vault-1-

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions