diff --git a/website/source/docs/audit/index.html.md b/website/source/docs/audit/index.html.md index 26878af10..39e0753cc 100644 --- a/website/source/docs/audit/index.html.md +++ b/website/source/docs/audit/index.html.md @@ -30,15 +30,18 @@ audit logs. The audit logs contain the full request and response objects for every interaction with Vault. The request and response can be matched utilizing a -unique identifier assigned to each request. The data in the request and the -data in the response (including secrets and authentication tokens) will be -hashed with a salt using HMAC-SHA256. +unique identifier assigned to each request. -The purpose of the hash is so that secrets aren't in plaintext within your -audit logs. However, you're still able to check the value of secrets by -generating HMACs yourself; this can be done with the audit device's hash -function and salt by using the `/sys/audit-hash` API endpoint (see the -documentation for more details). +With a few specific exceptions, all strings (including authentication tokens and lease information) contained within requests and +responses are hashed with a salt using HMAC-SHA256. The purpose of the hash is +so that secrets aren't in plaintext within your audit logs. However, you're +still able to check the value of secrets by generating HMACs yourself; this can +be done with the audit device's hash function and salt by using the +`/sys/audit-hash` API endpoint (see the documentation for more details). + +Note that currently only strings coming from JSON or being returned in JSON are +HMAC'd. Other data types, like integers, booleans, and so on, are passed +through in plaintext. ## Enabling/Disabling Audit Devices