Skip to content

Adding support for auto-unseal with transit secrets engine #27

@phong2tran

Description

@phong2tran

Every time Vault server is restarted through the deployment update, or BOSH resurrector, it's started up in a seal state. Vault server has to be unsealed manually via Vault cli or api before it can be used. We're running CF in our own data center (on-premises) and it looked like we can use the auto-unseal with transit secrets engine (https://learn.hashicorp.com/vault/operations/autounseal-transit) for automation of unseal operation, but this feature is only available in Vault v1.1 and second Vault cluster deployment is also required.

  1. Is there a plan to upgrade Vault version to 1.1.3 any time soon?

  2. Add options for configuring seal stanza with transit secrets engine for a Vault cluster to replace the default Shamir's secret sharing option for protecting the master key:

seal "transit" {
address = "http://127.0.0.1:8200"
disable_renewal = "false"
key_name = "autounseal"
mount_path = "transit/"
tls_skip_verify = "true"
}

  1. Add options/scripts to configure a Vault cluster as auto-seal key provider.

https://learn.hashicorp.com/vault/operations/autounseal-transit#step-1-configure-auto-unseal-key-provider-vault-1-

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions