diff --git a/website/source/guides/partnerships/index.html.md b/website/source/guides/partnerships/index.html.md index 730828cf3..6eff9e543 100644 --- a/website/source/guides/partnerships/index.html.md +++ b/website/source/guides/partnerships/index.html.md @@ -6,13 +6,13 @@ description: |- Guide to partnership integrations and creating plugins for Vault. --- -

Vault Integration Program

+# Vault Integration Program

The Vault Integration Program (VIP) enables vendors to build integrations with HashiCorp Vault that are officially tested and approved by HashiCorp. The program is intended to be largely self-service, with links to code samples, documentation and clearly defined integration steps.

-

Types of Vault Integrations

+## Types of Vault Integrations

By leveraging Vault's plugin system, vendors are able to build extensible secrets, authentication, and audit plugins to extend Vault's functionality. These integrations can be done with the OSS (open-source) version of Vault. Hardware Security Module (HSM) integrations need to be tested against Vault Enterprise since the HSM functionality is only supported in the Vault Enterprise version. @@ -58,12 +58,12 @@ Storage Backend: A storage backend is a durable storage location where

  • Support: Ongoing maintenance and support of the integration by the vendor.
  • -

    1. Engage

    +### 1. Engage

    Please begin by completing Vault Integration Program webform to tell us about your company and the Vault integration you’re interested in.

    -

    2. Enable

    +### 2. Enable

    Here are links to resources, documentation, examples and best practices to guide you through the Vault integration development and testing process:

    @@ -101,28 +101,28 @@ Here are links to resources, documentation, examples and best practices to guide

    Community Forum

    Vault developer community forum

    -

    3. Develop and Test

    +### 3. Develop and Test

    The only knowledge necessary to write a plugin is basic command-line skills and knowledge of the Go programming language. Use the plugin interface to develop your integration. All integrations should contain unit and acceptance testing.

    -

    4. Review

    +### 4. Review

    HashiCorp will review and certify your Vault integration. Please send the Vault logs and other relevant logs for verification at: vault-integration-dev@hashicorp.com. For Auth, Secret and Storage plugins, submit a GitHub pull request (PR) against the Vault project (https://github.com/hashicorp/vault). Where applicable, the vendor will need to provide HashiCorp with a test account.

    -

    5. Release

    +### 5. Release

    At this stage, the Vault integration is fully developed, documented, tested and certified. Once released, HashiCorp will officially list the Vault integration.

    -

    6. Support

    +### 6. Support

    Many vendors view the release step to be the end of the journey, while at HashiCorp we view it to be the start. Getting the Vault integration built is just the first step in enabling users. Once this is done, on-going effort is required to maintain the integration and address any issues in a timely manner. The expectation for vendors is to respond to all critical issues within 48 hours and all other issues within 5 business days. HashiCorp Vault has an extremely wide community of users and we encourage everyone to report issues however small, as well as help resolve them when possible.

    -

    Checklist

    +## Checklist

    Below is a checklist of steps that should be followed during the Vault integration development process. This reiterates the steps described above.

    -

    Contact Us

    +## Contact Us

    For any questions or feedback, please contact us at: vault-integration-dev@hashicorp.com