Adding pricing module note for enterprise features (#8217)
* adding pricing module note for enterprise features * fixing incorrectly committed go.mod
This commit is contained in:
parent
fc09eb1e6b
commit
efb2152759
|
@ -7,6 +7,9 @@ description: Vault Enterprise has support for Control Group Authorization.
|
|||
|
||||
# Vault Enterprise Control Group Support
|
||||
|
||||
-> **Note**: This feature requires [Vault Enterprise](https://www.hashicorp.com/products/vault/)
|
||||
with the Governance And Policy Module.
|
||||
|
||||
Vault Enterprise has support for Control Group Authorization. Control Groups
|
||||
add additional authorization factors to be required before satisfying a request.
|
||||
|
||||
|
|
|
@ -9,6 +9,9 @@ description: |-
|
|||
|
||||
# Entropy Augmentation
|
||||
|
||||
-> **Note**: This feature requires [Vault Enterprise](https://www.hashicorp.com/products/vault/)
|
||||
with the Governance & Policy Module.
|
||||
|
||||
Vault Enterprise features a mechanism to sample entropy (or randomness for
|
||||
cryptographic operations) from external cryptographic modules via the [seals](/docs/configuration/seal)
|
||||
interface. While the system entropy used by Vault is more than capable of
|
||||
|
|
|
@ -9,9 +9,8 @@ description: >-
|
|||
|
||||
# Vault Enterprise HSM Support
|
||||
|
||||
HSM support is a feature of [Vault
|
||||
Enterprise](https://www.hashicorp.com/vault) that takes advantage of HSMs
|
||||
to provide three pieces of special functionality:
|
||||
-> **Note**: This feature requires [Vault Enterprise](https://www.hashicorp.com/products/vault/)
|
||||
with the Governance & Policy Module.
|
||||
|
||||
- Master Key Wrapping: Vault protects its master key by transiting it through
|
||||
the HSM for encryption rather than splitting into key shares
|
||||
|
|
|
@ -9,6 +9,9 @@ description: >-
|
|||
|
||||
# Vault Enterprise MFA Support
|
||||
|
||||
-> **Note**: This feature requires [Vault Enterprise](https://www.hashicorp.com/products/vault/)
|
||||
with the Governance & Policy Module.
|
||||
|
||||
Vault Enterprise has support for Multi-factor Authentication (MFA), using
|
||||
different authentication types. MFA is built on top of the Identity system of
|
||||
Vault.
|
||||
|
|
|
@ -11,6 +11,8 @@ description: >-
|
|||
|
||||
## Overview
|
||||
|
||||
-> **Note**: This feature is available in all versions of [Vault Enterprise](https://www.hashicorp.com/products/vault/).
|
||||
|
||||
Many organizations implement Vault as a "service", providing centralized
|
||||
management for teams within an organization while ensuring that those teams
|
||||
operate within isolated environments known as _tenants_.
|
||||
|
|
|
@ -7,6 +7,9 @@ description: Performance Standby Nodes - Vault Enterprise
|
|||
|
||||
# Performance Standby Nodes
|
||||
|
||||
-> **Note**: This feature requires [Vault Enterprise](https://www.hashicorp.com/products/vault/)
|
||||
with the Multi-Datacenter & Scale Module.
|
||||
|
||||
Vault supports a multi-server mode for high availability. This mode protects
|
||||
against outages by running multiple Vault servers. High availability mode
|
||||
is automatically enabled when using a data store that supports it. You can
|
||||
|
|
|
@ -12,6 +12,10 @@ description: >-
|
|||
|
||||
## Overview
|
||||
|
||||
-> **Note**: All versions of [Vault Enterprise](https://www.hashicorp.com/products/vault/)
|
||||
have support for Disaster Recovery replication. Performance Replication requires the
|
||||
Multi-Datacenter & Scale module.
|
||||
|
||||
Many organizations have infrastructure that spans multiple datacenters. Vault
|
||||
provides the critical services of identity management, secrets storage, and
|
||||
policy management. This functionality is expected to be highly available and
|
||||
|
|
|
@ -9,6 +9,9 @@ description: |-
|
|||
|
||||
# Seal Wrap
|
||||
|
||||
-> **Note**: This feature requires [Vault Enterprise](https://www.hashicorp.com/products/vault/)
|
||||
with the Governance & Policy Module.
|
||||
|
||||
Vault Enterprise features a mechanism to wrap values with an extra layer of
|
||||
encryption for supporting [seals](/docs/configuration/seal). This adds an
|
||||
extra layer of protection and is useful in some compliance and regulatory
|
||||
|
|
|
@ -7,6 +7,9 @@ description: An overview of how Sentinel interacts with Vault Enterprise.
|
|||
|
||||
# Overview
|
||||
|
||||
-> **Note**: This feature requires [Vault Enterprise](https://www.hashicorp.com/products/vault/)
|
||||
with the Governance & Policy Module.
|
||||
|
||||
Vault Enterprise integrates HashiCorp Sentinel to provide a rich set of access
|
||||
control functionality. Because Vault is a security-focused product trusted with
|
||||
high-risk secrets and assets, and because of its default-deny stance,
|
||||
|
|
|
@ -9,6 +9,9 @@ description: |-
|
|||
|
||||
# KMIP Secrets Engine
|
||||
|
||||
-> **Note**: This secret engine requires [Vault Enterprise](https://www.hashicorp.com/products/vault/)
|
||||
with the Advanced Data Protection Module.
|
||||
|
||||
The KMIP secrets engine allows Vault to act as a [Key Management
|
||||
Interoperability Protocol](#kmip-spec) (KMIP) server provider and handle
|
||||
the lifecycle of its KMIP managed objects. KMIP is a standardized protocol that allows
|
||||
|
|
Loading…
Reference in New Issue