Point people in the right direction for tokens used in transit autounseal. (#16951)
This commit is contained in:
parent
b21e06b917
commit
1997fbb73f
|
@ -29,8 +29,9 @@ holder is allowed to do within Vault. Other mapped information includes
|
|||
metadata that can be viewed and is added to the audit log, such as creation
|
||||
time, last renewal time, and more.
|
||||
|
||||
|
||||
Read on for a deeper dive into token concepts.
|
||||
Read on for a deeper dive into token concepts. See the
|
||||
[tokens tutorial](https://learn.hashicorp.com/tutorials/vault/tokens)
|
||||
for details on how these concepts play out in practice.
|
||||
|
||||
## Token Types
|
||||
|
||||
|
|
|
@ -113,6 +113,12 @@ path "<mount path>/decrypt/<key name>" {
|
|||
}
|
||||
```
|
||||
|
||||
Other considerations for the token used:
|
||||
* it should probably be an [orphan token](/docs/concepts/tokens#token-hierarchies-and-orphan-tokens),
|
||||
otherwise when the parent token expires or gets revoked the seal will break.
|
||||
* consider making it a [periodic token](/docs/concepts/tokens#periodic-tokens)
|
||||
and not setting an explicit max TTL, otherwise at some point it will cease to be renewable.
|
||||
|
||||
## Key Rotation
|
||||
|
||||
This seal supports key rotation using the Transit Secret Engine's key rotation endpoints. See
|
||||
|
|
Loading…
Reference in New Issue