2015-04-22 22:09:12 +00:00
|
|
|
<script type="text/x-handlebars" data-template-name="welcome">
|
|
|
|
<p>
|
|
|
|
<strong>Welcome to the Vault interactive demo!</strong>
|
|
|
|
</p>
|
|
|
|
<p>
|
|
|
|
This will cover:
|
|
|
|
</p>
|
|
|
|
<ul>
|
|
|
|
<li>- Unsealing your Vault</li>
|
2015-04-23 01:48:24 +00:00
|
|
|
<li>- Authorizing your requests to Vault</li>
|
2015-04-22 22:09:12 +00:00
|
|
|
<li>- Mounting a backend</li>
|
|
|
|
<li>- Reading, writing and deleting secrets</li>
|
2015-04-23 01:48:24 +00:00
|
|
|
<li>- Sealing your Vault</li>
|
2015-04-22 22:09:12 +00:00
|
|
|
</ul>
|
|
|
|
<p>
|
2015-04-23 01:48:24 +00:00
|
|
|
<strong>Use the command "next" to move foward</strong>. This will work throughout
|
|
|
|
the tutorial, along with "previous".
|
2015-04-22 22:09:12 +00:00
|
|
|
</p>
|
2015-04-23 01:48:24 +00:00
|
|
|
</script>
|
|
|
|
|
|
|
|
<script type="text/x-handlebars" data-template-name="init">
|
2015-04-22 22:09:12 +00:00
|
|
|
<p>
|
2015-04-23 01:48:24 +00:00
|
|
|
Upon opening this terminal, you connected to a real in-memory Vault server.
|
|
|
|
Any commands you send across will work as with Vault normally, but closing this page
|
|
|
|
will end the session.
|
2015-04-22 22:09:12 +00:00
|
|
|
</p>
|
|
|
|
<p>
|
2015-04-23 01:48:24 +00:00
|
|
|
Please note that this is running in a shared environment, so avoid setting any real secrets.
|
2015-04-22 22:09:12 +00:00
|
|
|
</p>
|
|
|
|
</script>
|
2015-04-22 22:15:45 +00:00
|
|
|
|
2015-04-23 01:48:24 +00:00
|
|
|
|
|
|
|
|
2015-04-22 22:15:45 +00:00
|
|
|
<script type="text/x-handlebars" data-template-name="unseal">
|
|
|
|
<p>
|
2015-04-23 01:48:24 +00:00
|
|
|
<strong>{{model.humanName}}</strong>
|
|
|
|
</p>
|
|
|
|
<p>
|
|
|
|
Now we need to unseal the Vault that you have just initialized.
|
|
|
|
</p>
|
|
|
|
<p>
|
|
|
|
When a Vault server is started, it starts in a sealed state.
|
|
|
|
In this state, Vault is configured to know where and how to access the
|
|
|
|
physical storage, but doesn't know how to decrypt any of it.
|
|
|
|
</p>
|
|
|
|
<p>
|
|
|
|
Vault encrypts data with an encryption key. This key is also encrypted (but
|
|
|
|
not stored) and is called the "master key".
|
2015-04-22 22:15:45 +00:00
|
|
|
</p>
|
|
|
|
<p>
|
2015-04-23 01:48:24 +00:00
|
|
|
Decryting the master key requires a threshold of shards. In this example,
|
|
|
|
we use one shard to decrypt this master key, but you can use any number and
|
|
|
|
disribute shards to any number of operators.
|
2015-04-22 22:15:45 +00:00
|
|
|
</p>
|
|
|
|
<p>
|
|
|
|
Send the unseal key to Vault with "vault unseal <key>".
|
|
|
|
</p>
|
|
|
|
</script>
|