diff --git a/website/pages/docs/enterprise/control-groups/index.mdx b/website/pages/docs/enterprise/control-groups/index.mdx index d401b7275..11b7d740f 100644 --- a/website/pages/docs/enterprise/control-groups/index.mdx +++ b/website/pages/docs/enterprise/control-groups/index.mdx @@ -7,6 +7,9 @@ description: Vault Enterprise has support for Control Group Authorization. # Vault Enterprise Control Group Support +-> **Note**: This feature requires [Vault Enterprise](https://www.hashicorp.com/products/vault/) +with the Governance And Policy Module. + Vault Enterprise has support for Control Group Authorization. Control Groups add additional authorization factors to be required before satisfying a request. diff --git a/website/pages/docs/enterprise/entropy-augmentation/index.mdx b/website/pages/docs/enterprise/entropy-augmentation/index.mdx index dae40f84c..0d24a62a8 100644 --- a/website/pages/docs/enterprise/entropy-augmentation/index.mdx +++ b/website/pages/docs/enterprise/entropy-augmentation/index.mdx @@ -9,6 +9,9 @@ description: |- # Entropy Augmentation +-> **Note**: This feature requires [Vault Enterprise](https://www.hashicorp.com/products/vault/) +with the Governance & Policy Module. + Vault Enterprise features a mechanism to sample entropy (or randomness for cryptographic operations) from external cryptographic modules via the [seals](/docs/configuration/seal) interface. While the system entropy used by Vault is more than capable of diff --git a/website/pages/docs/enterprise/hsm/index.mdx b/website/pages/docs/enterprise/hsm/index.mdx index 4a4924fe7..a00e0f0ef 100644 --- a/website/pages/docs/enterprise/hsm/index.mdx +++ b/website/pages/docs/enterprise/hsm/index.mdx @@ -9,9 +9,8 @@ description: >- # Vault Enterprise HSM Support -HSM support is a feature of [Vault -Enterprise](https://www.hashicorp.com/vault) that takes advantage of HSMs -to provide three pieces of special functionality: +-> **Note**: This feature requires [Vault Enterprise](https://www.hashicorp.com/products/vault/) +with the Governance & Policy Module. - Master Key Wrapping: Vault protects its master key by transiting it through the HSM for encryption rather than splitting into key shares diff --git a/website/pages/docs/enterprise/mfa/index.mdx b/website/pages/docs/enterprise/mfa/index.mdx index b94a89d13..110987b14 100644 --- a/website/pages/docs/enterprise/mfa/index.mdx +++ b/website/pages/docs/enterprise/mfa/index.mdx @@ -9,6 +9,9 @@ description: >- # Vault Enterprise MFA Support +-> **Note**: This feature requires [Vault Enterprise](https://www.hashicorp.com/products/vault/) +with the Governance & Policy Module. + Vault Enterprise has support for Multi-factor Authentication (MFA), using different authentication types. MFA is built on top of the Identity system of Vault. diff --git a/website/pages/docs/enterprise/namespaces/index.mdx b/website/pages/docs/enterprise/namespaces/index.mdx index c7b734be4..daf45c664 100644 --- a/website/pages/docs/enterprise/namespaces/index.mdx +++ b/website/pages/docs/enterprise/namespaces/index.mdx @@ -11,6 +11,8 @@ description: >- ## Overview +-> **Note**: This feature is available in all versions of [Vault Enterprise](https://www.hashicorp.com/products/vault/). + Many organizations implement Vault as a "service", providing centralized management for teams within an organization while ensuring that those teams operate within isolated environments known as _tenants_. diff --git a/website/pages/docs/enterprise/performance-standby/index.mdx b/website/pages/docs/enterprise/performance-standby/index.mdx index a22277968..06ce74367 100644 --- a/website/pages/docs/enterprise/performance-standby/index.mdx +++ b/website/pages/docs/enterprise/performance-standby/index.mdx @@ -7,6 +7,9 @@ description: Performance Standby Nodes - Vault Enterprise # Performance Standby Nodes +-> **Note**: This feature requires [Vault Enterprise](https://www.hashicorp.com/products/vault/) +with the Multi-Datacenter & Scale Module. + Vault supports a multi-server mode for high availability. This mode protects against outages by running multiple Vault servers. High availability mode is automatically enabled when using a data store that supports it. You can diff --git a/website/pages/docs/enterprise/replication/index.mdx b/website/pages/docs/enterprise/replication/index.mdx index 4b122f77a..e02aa31d7 100644 --- a/website/pages/docs/enterprise/replication/index.mdx +++ b/website/pages/docs/enterprise/replication/index.mdx @@ -12,6 +12,10 @@ description: >- ## Overview +-> **Note**: All versions of [Vault Enterprise](https://www.hashicorp.com/products/vault/) +have support for Disaster Recovery replication. Performance Replication requires the +Multi-Datacenter & Scale module. + Many organizations have infrastructure that spans multiple datacenters. Vault provides the critical services of identity management, secrets storage, and policy management. This functionality is expected to be highly available and diff --git a/website/pages/docs/enterprise/sealwrap/index.mdx b/website/pages/docs/enterprise/sealwrap/index.mdx index cae54c752..b7ca1c527 100644 --- a/website/pages/docs/enterprise/sealwrap/index.mdx +++ b/website/pages/docs/enterprise/sealwrap/index.mdx @@ -9,6 +9,9 @@ description: |- # Seal Wrap +-> **Note**: This feature requires [Vault Enterprise](https://www.hashicorp.com/products/vault/) +with the Governance & Policy Module. + Vault Enterprise features a mechanism to wrap values with an extra layer of encryption for supporting [seals](/docs/configuration/seal). This adds an extra layer of protection and is useful in some compliance and regulatory diff --git a/website/pages/docs/enterprise/sentinel/index.mdx b/website/pages/docs/enterprise/sentinel/index.mdx index 5a0609f0d..722a34a5c 100644 --- a/website/pages/docs/enterprise/sentinel/index.mdx +++ b/website/pages/docs/enterprise/sentinel/index.mdx @@ -7,6 +7,9 @@ description: An overview of how Sentinel interacts with Vault Enterprise. # Overview +-> **Note**: This feature requires [Vault Enterprise](https://www.hashicorp.com/products/vault/) +with the Governance & Policy Module. + Vault Enterprise integrates HashiCorp Sentinel to provide a rich set of access control functionality. Because Vault is a security-focused product trusted with high-risk secrets and assets, and because of its default-deny stance, diff --git a/website/pages/docs/secrets/kmip/index.mdx b/website/pages/docs/secrets/kmip/index.mdx index 40baa16e1..2950efe54 100644 --- a/website/pages/docs/secrets/kmip/index.mdx +++ b/website/pages/docs/secrets/kmip/index.mdx @@ -9,6 +9,9 @@ description: |- # KMIP Secrets Engine +-> **Note**: This secret engine requires [Vault Enterprise](https://www.hashicorp.com/products/vault/) +with the Advanced Data Protection Module. + The KMIP secrets engine allows Vault to act as a [Key Management Interoperability Protocol](#kmip-spec) (KMIP) server provider and handle the lifecycle of its KMIP managed objects. KMIP is a standardized protocol that allows