Fix broken links referencing to API docs (#14565)

* Fix all '/api/' to '/api-docs/'

* Minor fixes

* Undo some of the unintentional changes
This commit is contained in:
Yoko Hyakuna 2022-03-17 18:14:48 -07:00 committed by GitHub
parent 08ea5f6d0a
commit f374938d31
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
93 changed files with 175 additions and 175 deletions

View File

@ -48,13 +48,13 @@ parameters unset in your configuration.
- `region` `(string: "us-east-1")` - The region to use for signing the authentication request. The
region Agent uses should match that corresponding to
[`sts_endpoint`](/api/auth/aws#sts_endpoint),
[`sts_endpoint`](/api-docs/auth/aws#sts_endpoint),
if a custom endpoint has been configured on the Vault server.
- `session_token` `(string: optional)` - The session token to use for authentication, if needed.
- `header_value` `(string: optional)` - If configured in Vault, the value to use for
[`iam_server_id_header_value`](/api/auth/aws#iam_server_id_header_value).
[`iam_server_id_header_value`](/api-docs/auth/aws#iam_server_id_header_value).
- `nonce` `(string: optional)` - If not provided, Vault will generate a new UUID every time `vault agent` runs.
If set, make sure you understand the importance of generating a good, unique `nonce` and protecting it.

View File

@ -91,4 +91,4 @@ block.
## API
Audit devices also have a full HTTP API. Please see the [Audit device API
docs](/api/system/audit) for more details.
docs](/api-docs/system/audit) for more details.

View File

@ -108,5 +108,5 @@ can be found found in the
## API
The AliCloud auth method has a full HTTP API. Please see the
[AliCloud Auth API](/api/auth/alicloud) for more
[AliCloud Auth API](/api-docs/auth/alicloud) for more
details.

View File

@ -120,5 +120,5 @@ management tool.
## API
The AppID auth method has a full HTTP API. Please see the
[AppID auth method API](/api/auth/app-id) for more
[AppID auth method API](/api-docs/auth/app-id) for more
details.

View File

@ -240,7 +240,7 @@ guide for a step-by-step tutorial.
## API
The AppRole auth method has a full HTTP API. Please see the
[AppRole API](/api/auth/approle) for more
[AppRole API](/api-docs/auth/approle) for more
details.
## Code Example
@ -261,7 +261,7 @@ import (
"os"
vault "github.com/hashicorp/vault/api"
auth "github.com/hashicorp/vault/api/auth/approle"
auth "github.com/hashicorp/vault/api-docs/auth/approle"
)
// Fetches a key-value secret (kv-v2) after authenticating via AppRole.

View File

@ -742,7 +742,7 @@ The response will be in JSON. For example:
## API
The AWS auth method has a full HTTP API. Please see the
[AWS Auth API](/api/auth/aws) for more
[AWS Auth API](/api-docs/auth/aws) for more
details.
## Code Example
@ -761,7 +761,7 @@ import (
"fmt"
vault "github.com/hashicorp/vault/api"
auth "github.com/hashicorp/vault/api/auth/aws"
auth "github.com/hashicorp/vault/api-docs/auth/aws"
)
// Fetches a key-value secret (kv-v2) after authenticating to Vault via AWS IAM,

View File

@ -42,7 +42,7 @@ The next sections review how the authN/Z workflows work. If you
have already reviewed these sections, here are some quick links to:
- [Usage](/docs/secrets/azure#usage)
- [API documentation](/api/auth/azure) docs.
- [API documentation](/api-docs/auth/azure) docs.
## Authentication
@ -139,7 +139,7 @@ tool.
authentication type, as well as overall constraints and configuration for
the generated auth tokens.
For the complete list of role options, please see the [API documentation](/api/auth/azure).
For the complete list of role options, please see the [API documentation](/api-docs/auth/azure).
### Via the API
@ -211,7 +211,7 @@ AZURE_GO_SDK_LOG_LEVEL=DEBUG
## API
The Azure Auth Plugin has a full HTTP API. Please see the [API documentation](/api/auth/azure) for more details.
The Azure Auth Plugin has a full HTTP API. Please see the [API documentation](/api-docs/auth/azure) for more details.
## Code Example
@ -230,7 +230,7 @@ import (
"fmt"
vault "github.com/hashicorp/vault/api"
auth "github.com/hashicorp/vault/api/auth/azure"
auth "github.com/hashicorp/vault/api-docs/auth/azure"
)
// Fetches a key-value secret (kv-v2) after authenticating to Vault via Azure authentication.

View File

@ -135,4 +135,4 @@ management tool.
## API
The TLS Certificate auth method has a full HTTP API. Please see the
[TLS Certificate API](/api/auth/cert) for more details.
[TLS Certificate API](/api-docs/auth/cert) for more details.

View File

@ -295,5 +295,5 @@ match the certificates you're checking.
## API
The CF auth method has a full HTTP API. Please see the [CF Auth API](/api/auth/cf)
The CF auth method has a full HTTP API. Please see the [CF Auth API](/api-docs/auth/cf)
for more details.

View File

@ -359,8 +359,8 @@ The GCP Auth Plugin has a full HTTP API. Please see the
[signjwt-method]: https://cloud.google.com/iam/docs/reference/credentials/rest/v1/projects.serviceAccounts/signJwt
[cloud-creds]: https://cloud.google.com/docs/authentication/production#providing_credentials_to_your_application
[service-accounts]: https://cloud.google.com/compute/docs/access/service-accounts
[api-docs]: /api/auth/gcp
[identity-group-aliases]: /api/secret/identity/group-alias
[api-docs]: /api-docs/auth/gcp
[identity-group-aliases]: /api-docs/secret/identity/group-alias
[instance-identity]: https://cloud.google.com/compute/docs/instances/verifying-instance-identity
[repo]: https://github.com/hashicorp/vault-plugin-auth-gcp

View File

@ -109,5 +109,5 @@ management tool.
## API
The GitHub auth method has a full HTTP API. Please see the
[GitHub Auth API](/api/auth/github) for more
[GitHub Auth API](/api-docs/auth/github) for more
details.

View File

@ -154,7 +154,7 @@ EOF
`cat jwt.json | jq -r .access_token | cut -d. -f2 | base64 -D`
- As of Vault 1.2, the [`verbose_oidc_logging`](/api/auth/jwt#verbose_oidc_logging) role
- As of Vault 1.2, the [`verbose_oidc_logging`](/api-docs/auth/jwt#verbose_oidc_logging) role
option is available which will log the received OIDC token to the _server_ logs if debug-level logging is enabled. This can
be helpful when debugging provider setup and verifying that the received claims are what you expect.
Since claims data is logged verbatim and may contain sensitive information, this option should not be
@ -240,7 +240,7 @@ management tool.
1. Use the `/config` endpoint to configure Vault. To support JWT roles, either local keys, a JWKS URL, or an OIDC
Discovery URL must be present. For OIDC roles, OIDC Discovery URL, OIDC Client ID and OIDC Client Secret are required. For the
list of available configuration options, please see the [API documentation](/api/auth/jwt).
list of available configuration options, please see the [API documentation](/api-docs/auth/jwt).
```text
$ vault write auth/jwt/config \
@ -345,4 +345,4 @@ JSON Pointer can be used as a selector. Refer to the
## API
The JWT Auth Plugin has a full HTTP API. Please see the
[API docs](/api/auth/jwt) for more details.
[API docs](/api-docs/auth/jwt) for more details.

View File

@ -70,7 +70,7 @@ You should set up a [Vault policy](https://learn.hashicorp.com/tutorials/vault/p
oidc_discovery_url="https://login.microsoftonline.com/tenant_id/v2.0"
```
1. Configure the [OIDC Role](/api/auth/jwt#create-role) with the following:
1. Configure the [OIDC Role](/api-docs/auth/jwt#create-role) with the following:
- `user_claim` should be `"email"`.
- `allowed_redirect_uris` should be the two redirect URIs for Vault CLI and UI access.
- `groups_claim` should be set to `"groups"`.
@ -84,16 +84,16 @@ You should set up a [Vault policy](https://learn.hashicorp.com/tutorials/vault/p
policies=default
```
1. In Vault, create the [external group](/api/secret/identity/group).
1. In Vault, create the [external group](/api-docs/secret/identity/group).
Record the group ID as you will need it for the group alias.
1. From Vault, retrieve the [OIDC accessor ID](/api/system/auth#list-auth-methods)
1. From Vault, retrieve the [OIDC accessor ID](/api-docs/system/auth#list-auth-methods)
from the OIDC auth method as you will need it for the group alias's `mount_accessor`.
1. Go to the Azure AD Group you want to attach to Vault's external group. Record the `objectId`
as you will need it as the group alias name in Vault.
1. In Vault, create a [group alias](/api/secret/identity/group-alias)
1. In Vault, create a [group alias](/api-docs/secret/identity/group-alias)
for the external group and set the `objectId` as the group alias name.
```shell
vault write identity/group-alias \
@ -168,7 +168,7 @@ Google-specific configuration is available when using Google as an identity prov
Vault JWT/OIDC auth method. The configuration allows Vault to obtain Google Workspace group membership and
user information during the JWT/OIDC authentication flow. The group membership obtained from Google Workspace
may be used for Identity group alias association. The user information obtained from Google Workspace can be
used to copy claims data into resulting auth token and alias metadata via [claim_mappings](/api/auth/jwt#claim_mappings).
used to copy claims data into resulting auth token and alias metadata via [claim_mappings](/api-docs/auth/jwt#claim_mappings).
#### Setup
@ -209,7 +209,7 @@ host that Vault is running on.
- `fetch_user_info` `(bool: false)` - If set to true, user info will be fetched from Google Workspace using the configured [user_custom_schemas](#user_custom_schemas).
- `groups_recurse_max_depth` `(int: <optional>)` - Group membership recursion max depth. Defaults to 0, which means don't recurse.
- `user_custom_schemas` `(string: <optional>)` - Comma-separated list of Google Workspace [custom schemas](https://developers.google.com/admin-sdk/directory/v1/guides/manage-schemas).
Values set for Google Workspace users using custom schema fields will be fetched and made available as claims that can be used with [claim_mappings](/api/auth/jwt#claim_mappings). Required if [fetch_user_info](#fetch_user_info) is set to true.
Values set for Google Workspace users using custom schema fields will be fetched and made available as claims that can be used with [claim_mappings](/api-docs/auth/jwt#claim_mappings). Required if [fetch_user_info](#fetch_user_info) is set to true.
Example configuration:

View File

@ -225,5 +225,5 @@ client.
## API
The Kerberos auth method has a full HTTP API. Please see the
[Kerberos auth method API](/api/auth/kerberos) for more
[Kerberos auth method API](/api-docs/auth/kerberos) for more
details.

View File

@ -81,7 +81,7 @@ management tool.
1. Use the `/config` endpoint to configure Vault to talk to Kubernetes. Use
`kubectl cluster-info` to validate the Kubernetes host address and TCP port.
For the list of available configuration options, please see the
[API documentation](/api/auth/kubernetes).
[API documentation](/api-docs/auth/kubernetes).
```bash
vault write auth/kubernetes/config \
@ -112,7 +112,7 @@ management tool.
namespace and it gives it the default policy.
For the complete list of configuration options, please see the [API
documentation](/api/auth/kubernetes).
documentation](/api-docs/auth/kubernetes).
## Kubernetes 1.21
@ -326,7 +326,7 @@ subjects:
## API
The Kubernetes Auth Plugin has a full HTTP API. Please see the
[API docs](/api/auth/kubernetes) for more details.
[API docs](/api-docs/auth/kubernetes) for more details.
[k8s-tokenreview]: https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.22/#tokenreview-v1-authentication-k8s-io
@ -347,7 +347,7 @@ import (
"os"
vault "github.com/hashicorp/vault/api"
auth "github.com/hashicorp/vault/api/auth/kubernetes"
auth "github.com/hashicorp/vault/api-docs/auth/kubernetes"
)
// Fetches a key-value secret (kv-v2) after authenticating to Vault with a Kubernetes service account.

View File

@ -267,5 +267,5 @@ It should be noted that user -> policy mapping happens at token creation time. A
## API
The LDAP auth method has a full HTTP API. Please see the
[LDAP auth method API](/api/auth/ldap) for more
[LDAP auth method API](/api-docs/auth/ldap) for more
details.

View File

@ -80,7 +80,7 @@ The Step-up Enterprise MFA uses the combination of mount accessors plus a `usern
| ---------------------------------------------- | ----------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| [Login MFA](/docs/auth/login-mfa) | CLI/API. The UI does not support the configuration of Login MFA as of Vault version 1.10. | Configured using the `identity/mfa/method` endpoints, then passing those method IDs to the `identity/mfa/login-enforcement` endpoint. MFA methods supported: TOTP, Okta, Duo, PingID. |
| [Okta Auth MFA](/docs/auth/okta) | CLI/API | MFA methods supported: [TOTP](https://help.okta.com/en/prod/Content/Topics/Security/mfa-totp-seed.htm) , [Okta Verify Push](https://help.okta.com/en/prod/Content/Topics/Mobile/ov-admin-config.htm). Note that Vault does not support Okta Verify Push with Number Challenge at this time. |
| [Step-up Enterprise MFA](/docs/enterprise/mfa) | CLI/API | [Configured](/api/system/mfa) using the `sys/mfa/method` endpoints and by referencing those methods in policies. MFA Methods supported: TOTP, Okta, Duo, PingID |
| [Step-up Enterprise MFA](/docs/enterprise/mfa) | CLI/API | [Configured](/api-docs/system/mfa) using the `sys/mfa/method` endpoints and by referencing those methods in policies. MFA Methods supported: TOTP, Okta, Duo, PingID |
### Q: Which MFA mechanism is used with the different MFA workflows in Vault version 1.10?

View File

@ -40,9 +40,9 @@ MFA in Vault includes the following login types:
## Login MFA Procedure
Login MFA can be configured to secure further authenticating to an auth method. To enable login
MFA, an MFA method needs to be configured. Please see [Login MFA API](/api/secret/identity/mfa) for details
MFA, an MFA method needs to be configured. Please see [Login MFA API](/api-docs/secret/identity/mfa) for details
on how to configure an MFA method. Once an MFA method is configured, an operator can configure an MFA enforcement using the returned unique MFA method ID.
Please see [Login MFA Enforcement API](/api/secret/identity/mfa/login-enforcement)
Please see [Login MFA Enforcement API](/api-docs/secret/identity/mfa/login-enforcement)
for details on how to configure an MFA enforcement config. MFA could be enforced for an entity, a group of
entities, a specific auth method accessor, or an auth method type. A login request that matches
any MFA enforcement restrictions is subject to further MFA validation,
@ -131,10 +131,10 @@ note that this can affect the login response on any auth mount protected by MFA
Note that the `uses_passcode` boolean value is always set to true for TOTP, and must always be set to false for Okta and PingID.
For Duo method, the value can be configured as part of the method configuration.
Please see [Duo API](/api/secret/identity/mfa/duo) for details
Please see [Duo API](/api-docs/secret/identity/mfa/duo) for details
on how to configure the boolean value for Duo.
To validate the MFA restricted login request, the user sends a second request to the [validate](/api/system/mfa/validate)
To validate the MFA restricted login request, the user sends a second request to the [validate](/api-docs/system/mfa/validate)
endpoint including the MFA request ID and MFA payload. MFA payload contains a map of methodIDs and their associated credentials.
If the configured MFA methods, such as PingID, Okta, and Duo, do not require a passcode, the associated
credentials will be a list with one empty string.

View File

@ -199,4 +199,4 @@ POST http://127.0.0.1/v1/auth/oci/login/devrole
## API
The OCI Auth method has a full HTTP API. Please see the [API docs](/api/auth/oci) for more details.
The OCI Auth method has a full HTTP API. Please see the [API docs](/api-docs/auth/oci) for more details.

View File

@ -130,4 +130,4 @@ management tool.
## API
The Okta auth method has a full HTTP API. Please see the
[Okta Auth API](/api/auth/okta) for more details.
[Okta Auth API](/api-docs/auth/okta) for more details.

View File

@ -78,5 +78,5 @@ The response will contain a token at `auth.client_token`:
## API
The RADIUS auth method has a full HTTP API. Please see the
[RADIUS Auth API](/api/auth/radius) for more
[RADIUS Auth API](/api-docs/auth/radius) for more
details.

View File

@ -36,5 +36,5 @@ either `X-Vault-Token: <token>` or `Authorization: Bearer <token>`.
## API
The Token auth method has a full HTTP API. Please see the
[Token auth method API](/api/auth/token) for more
[Token auth method API](/api-docs/auth/token) for more
details.

View File

@ -84,4 +84,4 @@ management tool.
## API
The Userpass auth method has a full HTTP API. Please see the [Userpass auth
method API](/api/auth/userpass) for more details.
method API](/api-docs/auth/userpass) for more details.

View File

@ -28,7 +28,7 @@ $ vault delete transit/keys/my-key
```
Note: changing the `deletion_allowed` parameter to `true` is necessary for the
key to be successfully deleted, you can read more on key parameters [here](/api/secret/transit#update-key-configuration)
key to be successfully deleted, you can read more on key parameters [here](/api-docs/secret/transit#update-key-configuration)
Delete an IAM role:

View File

@ -59,7 +59,7 @@ vault <command> [options] [path] [args]
The following `write` command creates a new user (`bob`) in the userpass auth
method. It passes the `-address` flag to specify the Vault server address which
precedes the path (`auth/userpass/users/bob`) and its
[argument](/api/auth/userpass#create-update-user)
[argument](/api-docs/auth/userpass#create-update-user)
(`password="long-password"`) at last.
```shell-session
@ -67,7 +67,7 @@ $ vault write -address="http://127.0.0.1:8200" auth/userpass/users/bob password=
```
If multiple options (`-address` and `-namespace`) and
[arguments](/api/auth/userpass#create-update-user) (`password` and
[arguments](/api-docs/auth/userpass#create-update-user) (`password` and
`policies`) are specified, the command would look like:
```shell-session
@ -302,7 +302,7 @@ limiting is off by default.
_Note:_ The rate is limited for each invocation of the `vault` CLI. Since
each invocation of the `vault` CLI typically only makes a few requests,
this environment variable is most useful when using the Go
[Vault client API](/api/libraries#go).
[Vault client API](/api-docs/libraries#go).
### `VAULT_NAMESPACE`

View File

@ -128,7 +128,7 @@ import (
"log"
vault "github.com/hashicorp/vault/api"
auth "github.com/hashicorp/vault/api/auth/userpass"
auth "github.com/hashicorp/vault/api-docs/auth/userpass"
)
// Once you've set the token for your Vault client, you will need to

View File

@ -35,7 +35,7 @@ When anything authenticates to Vault, be it a user, application, machine, etc.,
## But wait, theres more...
Want to take full advantage of the Vault identity system and how clients are counted? The Vault identity system also has [Entity Aliases](https://www.vaultproject.io/api/secret/identity/entity-alias) and [Identity Groups](https://www.vaultproject.io/api-docs/secret/identity/group-alias).
Want to take full advantage of the Vault identity system and how clients are counted? The Vault identity system also has [Entity Aliases](/api-docs/secret/identity/entity-alias) and [Identity Groups](/api-docs/secret/identity/group-alias).
![Vault Identity Entities and Aliases](https://www.datocms-assets.com/2885/1617325026-vault-clients-identity-entity-aliases.png)
@ -90,23 +90,23 @@ How does this relate to Vault clients? As outlined above, and as an example, if
| **Auth method** | **Name reported by auth method** |
| ------------------------------------------------------------------------------------------------ | ---------------------------------------------------------------------------------- |
| **[AliCloud](https://www.vaultproject.io/docs/auth/alicloud)** | Principal ID |
| **[AppRole](https://www.vaultproject.io/api-docs/auth/approle#create-update-approle)** | Role ID |
| **[AppRole](/api-docs/auth/approle#create-update-approle)** | Role ID |
| **[AWS IAM](https://www.vaultproject.io/docs/auth/aws#iam-auth-method)** | Configurable via iam_alias to one of: Role ID (default), IAM unique ID, Full ARN |
| **[AWS EC2](https://www.vaultproject.io/docs/auth/aws#ec2-auth-method)** | Configurable via ec2_alias to one of: Role ID (default), EC2 instance ID, AMI ID |
| **[Azure](https://www.vaultproject.io/api-docs/auth/azure#create-role)** | Subject (from JWT claim) |
| **[Azure](/api-docs/auth/azure#create-role)** | Subject (from JWT claim) |
| **[Cloud Foundry](https://www.vaultproject.io/docs/auth/cf)** | App ID |
| **[GitHub](https://www.vaultproject.io/docs/auth/github)** | User login name associated with token |
| **[Google Cloud](https://www.vaultproject.io/api-docs/auth/gcp#create-role)** | Configurable via iam_alias to one of: Role ID (default), Service account unique ID |
| **[JWT/OIDC](https://www.vaultproject.io/api-docs/auth/jwt#create-role)** | Configurable via user_claim to one of the presented claims (no default value) |
| **[Google Cloud](/api-docs/auth/gcp#create-role)** | Configurable via iam_alias to one of: Role ID (default), Service account unique ID |
| **[JWT/OIDC](/api-docs/auth/jwt#create-role)** | Configurable via user_claim to one of the presented claims (no default value) |
| **[Kerberos](https://www.vaultproject.io/docs/auth/kerberos)** | Username |
| **[Kubernetes](https://www.vaultproject.io/api-docs/auth/kubernetes#create-role)** | Service account UID |
| **[Kubernetes](/api-docs/auth/kubernetes#create-role)** | Service account UID |
| **[LDAP](https://www.vaultproject.io/docs/auth/ldap)** | Username |
| **[OCI](https://www.vaultproject.io/api-docs/auth/oci#create-role)** | Rolename |
| **[Okta](https://www.vaultproject.io/api-docs/auth/okta#register-user)** | Username |
| **[OCI](/api-docs/auth/oci#create-role)** | Rolename |
| **[Okta](/api-docs/auth/okta#register-user)** | Username |
| **[RADIUS](https://www.vaultproject.io/docs/auth/radius)** | Username |
| **[TLS Certificate](https://www.vaultproject.io/api-docs/auth/cert#create-ca-certificate-role)** | Subject CommonName |
| **[TLS Certificate](/api-docs/auth/cert#create-ca-certificate-role)** | Subject CommonName |
| **[Token](https://www.vaultproject.io/docs/auth/token)** | entity_alias, if provided (Note: please ensure that entity_alias is always used) |
| **[Username/Password](https://www.vaultproject.io/api-docs/auth/userpass#create-update-user)** | Username |
| **[Username/Password](/api-docs/auth/userpass#create-update-user)** | Username |
## Considerations with CI/CD
@ -213,7 +213,7 @@ entity_id n/a
To reduce the number of non-entity tokens in use, consider switching to an authentication method such as
[AppRole](/docs/auth/approle) instead of handing out directly-created tokens. Ensure that entities and
[entity aliases](/api/secret/identity/entity-alias) exist for all login methods used to create batch tokens.
[entity aliases](/api-docs/secret/identity/entity-alias) exist for all login methods used to create batch tokens.
### Tracking non-entity tokens
@ -242,7 +242,7 @@ request; this can happen if the request is unauthenticated, or made with a root
## API and Permissions
Please see [Client Count API](/api/system/internal-counters#client-count) for more details. Note that this API is marked as
Please see [Client Count API](/api-docs/system/internal-counters#client-count) for more details. Note that this API is marked as
"internal" so its behavior or format may change without warning. The UI is the preferred means of interacting with the
client count feature.

View File

@ -49,7 +49,7 @@ Raft clusters deployed with older versions of Vault will also transition to use
Autopilot automatically.
Autopilot exposes a [configuration
API](/api/system/storage/raftautopilot#set-configuration) to manage its
API](/api-docs/system/storage/raftautopilot#set-configuration) to manage its
behavior. Autopilot gets initialized with the following default values.
- `cleanup_dead_servers` - `false`
@ -72,7 +72,7 @@ independently of their primary.
DR secondary clusters will also have their own Autopilot configuration (starting
in Vault 1.8.0), managed independently of their primary. The [Autopilot
API](/api/system/storage/raftautopilot) uses DR operation tokens for
API](/api-docs/system/storage/raftautopilot) uses DR operation tokens for
authorization.
## Learn

View File

@ -70,4 +70,4 @@ step-by-step tutorial.
## API
Rate limit quotas can be managed over the HTTP API. Please see
[Rate Limit Quotas API](/api/system/rate-limit-quotas) for more details.
[Rate Limit Quotas API](/api-docs/system/rate-limit-quotas) for more details.

View File

@ -70,7 +70,7 @@ used for just enough initial setup (usually, setting up auth methods
and policies necessary to allow administrators to acquire more limited tokens)
or in emergencies, and are revoked immediately after they are no longer needed.
If a new root token is needed, the `operator generate-root` command and associated
[API endpoint](/api/system/generate-root) can be used to generate one on-the-fly.
[API endpoint](/api-docs/system/generate-root) can be used to generate one on-the-fly.
It is also good security practice for there to be multiple eyes on a terminal
whenever a root token is live. This way multiple people can verify as to the
@ -159,7 +159,7 @@ token's information is looked up. It is based on a combination of factors:
1. The system max TTL, which is 32 days but can be changed in Vault's
configuration file.
2. The max TTL set on a mount using [mount
tuning](/api/system/mounts). This value
tuning](/api-docs/system/mounts). This value
is allowed to override the system max TTL -- it can be longer or shorter,
and if set this value will be respected.
3. A value suggested by the auth method that issued the token. This

View File

@ -26,9 +26,9 @@ advertise the correct address to other nodes.
As of version 1.9, Vault supports defining custom HTTP response headers for the root path (`/`) and also on API endpoints (`/v1/*`).
The headers are defined based on the returned status code. For example, a user can define a list of
custom response headers for the `200` status code, and another list of custom response headers for
the `307` status code. There is a `"/sys/config/ui"` [API endpoint](/api/system/config-ui) which allows users
the `307` status code. There is a `"/sys/config/ui"` [API endpoint](/api-docs/system/config-ui) which allows users
to set `UI` specific custom headers. If a header is configured in a configuration file, it is not allowed
to be reconfigured through the `"/sys/config/ui"` [API endpoint](/api/system/config-ui). In cases where a
to be reconfigured through the `"/sys/config/ui"` [API endpoint](/api-docs/system/config-ui). In cases where a
custom header value needs to be modified or the custom header needs to be removed, the Vault's configuration file
needs to be modified accordingly, and a `SIGHUP` signal needs to be sent to the Vault process.
@ -40,11 +40,11 @@ upon start up indicating the header with `X-Vault-` prefix is not accepted.
### Order of precedence
If the same header is configured in both the configuration file and
in the `"/sys/config/ui"` [API endpoint](/api/system/config-ui), the header in the configuration file takes precedence.
in the `"/sys/config/ui"` [API endpoint](/api-docs/system/config-ui), the header in the configuration file takes precedence.
For example, the `"Content-Security-Policy"` header is defined by default in the
`"/sys/config/ui"` [API endpoint](/api/system/config-ui). If that header is also defined in the configuration file,
`"/sys/config/ui"` [API endpoint](/api-docs/system/config-ui). If that header is also defined in the configuration file,
the value in the configuration file is set in the response headers instead of the
default value in the `"/sys/config/ui"` [API endpoint](/api/system/config-ui).
default value in the `"/sys/config/ui"` [API endpoint](/api-docs/system/config-ui).
## `tcp` Listener Parameters

View File

@ -112,7 +112,7 @@ path "<mount path>/decrypt/<key name>" {
## Key Rotation
This seal supports key rotation using the Transit Secret Engine's key rotation endpoints. See
[doc](/api/secret/transit#rotate-key). Old keys must not be disabled or deleted and are
[doc](/api-docs/secret/transit#rotate-key). Old keys must not be disabled or deleted and are
used to decrypt older data.
## Learn

View File

@ -211,4 +211,4 @@ guide for a step-by-step tutorial.
## API
Control Groups can be managed over the HTTP API. Please see
[Control Groups API](/api/system/control-group) for more details.
[Control Groups API](/api-docs/system/control-group) for more details.

View File

@ -15,7 +15,7 @@ effect when using Vault with an HSM.
Normally, Vault uses a single set of unseal keys to perform both decryption of
the cryptographic barrier and to authorize recovery operations, such as the
[`generate-root`](/api/system/generate-root)
[`generate-root`](/api-docs/system/generate-root)
functionality.
When using an HSM, because the HSM automatically unseals the barrier but
@ -55,7 +55,7 @@ keys for this purpose, rather than the barrier unseal keys, is automatic.
When initializing, the split is performed according to the following CLI flags
and their API equivalents in the
[/sys/init](/api/system/init) endpoint:
[/sys/init](/api-docs/system/init) endpoint:
- `recovery-shares`: The number of shares into which to split the recovery
key. This value is equivalent to the `recovery_shares` value in the API
@ -90,7 +90,7 @@ this is performed by using the `-target=recovery` flag to `vault operator rekey`
Via the API, the rekey operation is performed with the same parameters as the
[normal `/sys/rekey`
endpoint](/api/system/rekey); however, the
endpoint](/api-docs/system/rekey); however, the
API prefix for this operation is at `/sys/rekey-recovery-key` rather than
`/sys/rekey`.

View File

@ -52,4 +52,4 @@ step-by-step tutorial.
## API
Lease count quotas can be managed over the HTTP API. Please see
[Lease Count Quotas API](/api/system/lease-count-quotas) for more details.
[Lease Count Quotas API](/api-docs/system/lease-count-quotas) for more details.

View File

@ -8,7 +8,7 @@ description: An overview of license autoloading.
Prior to Vault 1.8, Vault Enterprise would be licensed using special binaries
that contained embedded licenses, or via a license written into Vault storage
using the [POST sys/license API](/api/system/license#install-license).
using the [POST sys/license API](/api-docs/system/license#install-license).
As of Vault 1.8 those options still exist but are deprecated, and the recommended
mechanism for managing licenses is called License Autoloading. New clusters are
@ -30,4 +30,4 @@ are discrepancies.
If autoloading is used, any existing stored license will be ignored. The presence
of a stored license in conjunction with an autoloaded license will also result in
logged warnings. Once a migration to autoloading is completed, it is recommended to use
the [DELETE API](/api/system/license#delete-license) to remove the stored license.
the [DELETE API](/api-docs/system/license#delete-license) to remove the stored license.

View File

@ -29,7 +29,7 @@ Support for additional integrations may be added in the future.
## Plugin Support
The [PKI Secrets Engine](/api/secret/pki#managed-keys) has been integrated
The [PKI Secrets Engine](/api-docs/secret/pki#managed-keys) has been integrated
with Managed Keys to offer certificate generation, both root and intermediary
PKI paths, leveraging private keys from an external trusted KMS.
@ -39,4 +39,4 @@ Managed Keys can be managed over the HTTP API. Please see
[Managed Keys API](/api-docs/system/managed-keys) for more details.
To configure PKI secrets engine with Managed Keys please see
[PKI Secret API](/api/secret/pki#managed-keys)
[PKI Secret API](/api-docs/secret/pki#managed-keys)

View File

@ -41,7 +41,7 @@ MFA in Vault can be of the following types.
## Configuring MFA Methods
MFA methods are globally managed within the `System Backend` using the HTTP API.
Please see [MFA API](/api/system/mfa) for details on how to configure an MFA
Please see [MFA API](/api-docs/system/mfa) for details on how to configure an MFA
method.
## MFA Methods In Policies
@ -112,4 +112,4 @@ $ curl \
### API
MFA can be managed entirely over the HTTP API. Please see [MFA API](/api/system/mfa) for more details.
MFA can be managed entirely over the HTTP API. Please see [MFA API](/api-docs/system/mfa) for more details.

View File

@ -53,7 +53,7 @@ based on consul configuration).
Additionally, if you wish to point your load balancers at performance standby
nodes, the `sys/health` endpoint can be used to determine if a node is a
performance standby. See the [sys/health API](/api/system/health) docs for
performance standby. See the [sys/health API](/api-docs/system/health) docs for
more info.
## Disabling Performance Standbys

View File

@ -123,7 +123,7 @@ DR is designed to be a mechanism to protect against catastrophic failure of enti
They do not forward service read or write requests until they are elected and become a new primary.
For more information on the capabilities of performance and disaster recovery replication, see the Vault Replication [API Documentation](/api/system/replication).
For more information on the capabilities of performance and disaster recovery replication, see the Vault Replication [API Documentation](/api-docs/system/replication).
## Primary and Secondary Cluster Compatibility
@ -230,5 +230,5 @@ Refer to the following tutorials replication setup and best practices:
## API
The Vault replication component has a full HTTP API. Please see the
[Vault Replication API](/api/system/replication) for more
[Vault Replication API](/api-docs/system/replication) for more
details.

View File

@ -89,7 +89,7 @@ able to glean from the original request alone.
Sentinel policies can be configured via the `sys/policies/rgp/` and
`sys/policies/egp/` endpoints; see [the
documentation](/api/system/policies) for more information.
documentation](/api-docs/system/policies) for more information.
Once set, RGPs can be assigned to Identity entities and groups or to tokens
just like ACL policies. As a result, they cannot share names with ACL policies.

View File

@ -113,7 +113,7 @@ make sure the executable referenced in the command exists in the plugin
directory. When added to the catalog the plugin is not automatically executed,
it instead becomes visible to backends and can be executed by them. For more
information on the plugin catalog please see the [Plugin Catalog API
docs](/api/system/plugins-catalog).
docs](/api-docs/system/plugins-catalog).
An example of plugin registration in current versions of Vault:

View File

@ -10,7 +10,7 @@ description: >-
## Launching the Vault AMI
When Vault is first launched from an official Marketplace AMI, it will come up in an uninitialized state and must be initialized via the [API](/api/system/init), [CLI](/docs/commands/operator/init), or UI. The Marketplace AMI listens on port 8200 by default. It is recommended to restrict ingress networking to the Vault instance as much as possible when initially deploying Vault (through EC2 security groups or otherwise) because anyone with network access to Vault will be able to initialize it. To learn more about the default listener configuration, or to make changes, please see the [Vault Deployment Guide](https://learn.hashicorp.com/vault/operations/ops-deployment-guide#listener-stanza).
When Vault is first launched from an official Marketplace AMI, it will come up in an uninitialized state and must be initialized via the [API](/api-docs/system/init), [CLI](/docs/commands/operator/init), or UI. The Marketplace AMI listens on port 8200 by default. It is recommended to restrict ingress networking to the Vault instance as much as possible when initially deploying Vault (through EC2 security groups or otherwise) because anyone with network access to Vault will be able to initialize it. To learn more about the default listener configuration, or to make changes, please see the [Vault Deployment Guide](https://learn.hashicorp.com/vault/operations/ops-deployment-guide#listener-stanza).
Additionally on first launch, a new self-signed [certificate](/docs/configuration/listener/tcp#tls_cert_file) and [key](/docs/configuration/listener/tcp#tls_key_file) (unique to the EC2 instance) will be generated to secure Vault traffic using TLS. This is provided as a “more secure” (vs. unencrypted TCP traffic) temporary solution, but it is strongly recommended to replace these with your own certificate and key. Please note that when using a self-signed certificate, Vault clients will need to [skip](/docs/commands#vault_skip_verify) the verification of Vaults certificate, which voids Vaults [security model](/docs/internals/security).

View File

@ -76,7 +76,7 @@ The following parameters are supported by the Vault provider:
- `secretPath` `(string: "")` - The path in Vault where the secret is located.
For secrets that are retrieved via HTTP GET method, the `secretPath` can include optional URI parameters,
for example, the [version of the KV2 secret](https://www.vaultproject.io/api/secret/kv/kv-v2#read-secret-version):
for example, the [version of the KV2 secret](https://www.vaultproject.io/api-docs/secret/kv/kv-v2#read-secret-version):
```yaml
objects: |
@ -97,5 +97,5 @@ The following parameters are supported by the Vault provider:
```
~> `secretArgs` are sent as part of the HTTP request body. Therefore, they are only effective for HTTP PUT/POST requests, for instance,
the [request used to generate a new certificate](https://www.vaultproject.io/api/secret/pki#generate-certificate).
the [request used to generate a new certificate](https://www.vaultproject.io/api-docs/secret/pki#generate-certificate).
To supply additional parameters for secrets retrieved via HTTP GET, include optional URI paramters in [`secretPath`](#secretpath).

View File

@ -15,7 +15,7 @@ This is designed for a high-load environment where many instances may be accessi
a shared password simultaneously. With a simple set up and a simple creds API,
it doesn't require instances to be manually registered in advance to gain access.
As long as access has been granted to the creds path via a method like
[AppRole](/api/auth/approle), they're available. Passwords are
[AppRole](/api-docs/auth/approle), they're available. Passwords are
lazily rotated based on preset TTLs and can have a length configured to meet your needs. Additionally,
passwords can be manually rotated using the [rotate-role](/api-docs/secret/ad#rotate-role-credentials) endpoint.
@ -123,7 +123,7 @@ management tool.
```
4. Grant "my-application" access to its creds at `ad/creds/my-application` using an
auth method like [AppRole](/api/auth/approle).
auth method like [AppRole](/api-docs/auth/approle).
### FAQ
@ -355,5 +355,5 @@ for a step-by-step tutorial.
## API
The Active Directory secrets engine has a full HTTP API. Please see the
[Active Directory secrets engine API](/api/secret/ad) for more
[Active Directory secrets engine API](/api-docs/secret/ad) for more
details.

View File

@ -207,5 +207,5 @@ the proper permission, it can generate credentials.
## API
The AliCloud secrets engine has a full HTTP API. Please see the
[AliCloud secrets engine API](/api/secret/alicloud) for more
[AliCloud secrets engine API](/api-docs/secret/alicloud) for more
details.

View File

@ -164,7 +164,7 @@ the proper permission, it can generate credentials.
~> **Note:** Due to AWS eventual consistency, after calling the
`aws/config/rotate-root` endpoint, subsequent calls from Vault to
AWS may fail for a few seconds until AWS becomes consistent again.
See the [AWS secrets engine API](/api/secret/aws#rotate-root-iam-credentials)
See the [AWS secrets engine API](/api-docs/secret/aws#rotate-root-iam-credentials)
for further information on `config/rotate-root` functionality.
## Example IAM Policy for Vault
@ -479,5 +479,5 @@ errors for exceeding the AWS limit of 32 characters on STS token names.
## API
The AWS secrets engine has a full HTTP API. Please see the
[AWS secrets engine API](/api/secret/aws) for more
[AWS secrets engine API](/api-docs/secret/aws) for more
details.

View File

@ -352,6 +352,6 @@ for a step-by-step tutorial.
The Azure secrets engine has a full HTTP API. Please see the [Azure secrets engine API docs][api]
for more details.
[api]: /api/secret/azure
[config]: /api/secret/azure#configure-access
[api]: /api-docs/secret/azure
[config]: /api-docs/secret/azure#configure-access
[repo]: https://github.com/hashicorp/vault-plugin-secrets-azure

View File

@ -160,7 +160,7 @@ step-by-step tutorial.
## API
The Consul secrets engine has a full HTTP API. Please see the
[Consul secrets engine API](/api/secret/consul) for more
[Consul secrets engine API](/api-docs/secret/consul) for more
details.
[consul-mgmt-token]: https://www.consul.io/docs/agent/http/acl.html#acl_create

View File

@ -59,5 +59,5 @@ guide for a step-by-step tutorial.
## API
The Cubbyhole secrets engine has a full HTTP API. Please see the
[Cubbyhole secrets engine API](/api/secret/cubbyhole) for more
[Cubbyhole secrets engine API](/api-docs/secret/cubbyhole) for more
details.

View File

@ -88,6 +88,6 @@ the proper permission, it can generate credentials.
## API
The full list of configurable options can be seen in the [Cassandra database plugin API](/api/secret/databases/cassandra) page.
The full list of configurable options can be seen in the [Cassandra database plugin API](/api-docs/secret/databases/cassandra) page.
For more information on the database secrets engine's HTTP API please see the [Database secret secrets engine API](/api/secret/databases) page.
For more information on the database secrets engine's HTTP API please see the [Database secret secrets engine API](/api-docs/secret/databases) page.

View File

@ -175,7 +175,7 @@ the proper permission, it can generate credentials.
## API
The full list of configurable options can be seen in the [Elasticsearch database plugin API](/api/secret/databases/elasticdb.html) page.
The full list of configurable options can be seen in the [Elasticsearch database plugin API](/api-docs/secret/databases/elasticdb.html) page.
For more information on the database secrets engine's HTTP API please see the
[Database secrets engine API](/api/secret/databases) page.
[Database secrets engine API](/api-docs/secret/databases) page.

View File

@ -79,7 +79,7 @@ the proper permission, it can generate credentials.
## API
The full list of configurable options can be seen in the [HANA database plugin API](/api/secret/databases/hanadb) page.
The full list of configurable options can be seen in the [HANA database plugin API](/api-docs/secret/databases/hanadb) page.
For more information on the database secrets engine's HTTP API please see the
[Database secrets engine API](/api/secret/databases) page.
[Database secrets engine API](/api-docs/secret/databases) page.

View File

@ -223,4 +223,4 @@ Refer to the following step-by-step tutorials for more information:
## API
The database secrets engine has a full HTTP API. Please see the [Database secret
secrets engine API](/api/secret/databases) for more details.
secrets engine API](/api-docs/secret/databases) for more details.

View File

@ -80,7 +80,7 @@ the proper permission, it can generate credentials.
## API
The full list of configurable options can be seen in the [InfluxDB database
plugin API](/api/secret/databases/influxdb) page.
plugin API](/api-docs/secret/databases/influxdb) page.
For more information on the database secrets engine's HTTP API please see the [Database secret
secrets engine API](/api/secret/databases) page.
secrets engine API](/api-docs/secret/databases) page.

View File

@ -107,7 +107,7 @@ step-by-step tutorial.
## API
The full list of configurable options can be seen in the [MongoDB database
plugin API](/api/secret/databases/mongodb) page.
plugin API](/api-docs/secret/databases/mongodb) page.
For more information on the database secrets engine's HTTP API please see the
[Database secrets engine API](/api/secret/databases) page.
[Database secrets engine API](/api-docs/secret/databases) page.

View File

@ -81,4 +81,4 @@ The full list of configurable options can be seen in the [MongoDB Atlas Database
Plugin HTTP API](/api-docs/secret/databases/mongodbatlas) page.
For more information on the database secrets engine's HTTP API please see the
[Database Secrets Engine API](/api/secret/databases) page.
[Database Secrets Engine API](/api-docs/secret/databases) page.

View File

@ -165,7 +165,7 @@ vault write database/roles/my-role revocation_statements="\
## API
The full list of configurable options can be seen in the [MSSQL database
plugin API](/api/secret/databases/mssql) page.
plugin API](/api-docs/secret/databases/mssql) page.
For more information on the database secrets engine's HTTP API please see the
[Database secrets engine API](/api/secret/databases) page.
[Database secrets engine API](/api-docs/secret/databases) page.

View File

@ -141,7 +141,7 @@ $ vault write database/roles/my-role \
The default root rotation setup for MySQL uses the `ALTER USER` syntax present
in MySQL 5.7 and up. For MySQL 5.6, the [root rotation
statements](/api/secret/databases#root_rotation_statements)
statements](/api-docs/secret/databases#root_rotation_statements)
must be configured to use the old `SET PASSWORD` syntax. For example:
```shell-session
@ -160,7 +160,7 @@ Rotation](/guides/secret-mgmt/db-root-rotation).
## API
The full list of configurable options can be seen in the [MySQL database plugin
API](/api/secret/databases/mysql-maria) page.
API](/api-docs/secret/databases/mysql-maria) page.
For more information on the database secrets engine's HTTP API please see the
[Database secrets engine API](/api/secret/databases) page.
[Database secrets engine API](/api-docs/secret/databases) page.

View File

@ -232,7 +232,7 @@ the proper permission, it can generate credentials.
## API
The full list of configurable options can be seen in the [Oracle database plugin
API](/api/secret/databases/oracle) page.
API](/api-docs/secret/databases/oracle) page.
For more information on the database secrets engine's HTTP API please see the
[Database secrets engine API](/api/secret/databases) page.
[Database secrets engine API](/api-docs/secret/databases) page.

View File

@ -88,7 +88,7 @@ the proper permission, it can generate credentials.
## API
The full list of configurable options can be seen in the [PostgreSQL database
plugin API](/api/secret/databases/postgresql) page.
plugin API](/api-docs/secret/databases/postgresql) page.
For more information on the database secrets engine's HTTP API please see the
[Database secrets engine API](/api/secret/databases) page.
[Database secrets engine API](/api-docs/secret/databases) page.

View File

@ -81,7 +81,7 @@ the proper permission, it can generate credentials.
## API
The full list of configurable options can be seen in the [Redshift database
plugin API](/api/secret/databases/redshift) page.
plugin API](/api-docs/secret/databases/redshift) page.
For more information on the database secrets engine's HTTP API please see the
[Database secrets engine API](/api/secret/databases) page.
[Database secrets engine API](/api-docs/secret/databases) page.

View File

@ -105,7 +105,7 @@ the proper permission, it can generate credentials.
## API
The full list of configurable options can be seen in the [Snowflake database
plugin API](/api/secret/databases/snowflake) page.
plugin API](/api-docs/secret/databases/snowflake) page.
For more information on the database secrets engine's HTTP API please see the
[Database secrets engine API](/api/secret/databases) page.
[Database secrets engine API](/api-docs/secret/databases) page.

View File

@ -500,7 +500,7 @@ You can either:
If the mount is configured with credentials directly, the credential's key may be
rotated to a Vault-generated value that is not accessible by the operator. For more
details on this operation, please see the
[Root Credential Rotation](/api/secret/gcp#rotate-root-credentials) API docs.
[Root Credential Rotation](/api-docs/secret/gcp#rotate-root-credentials) API docs.
## Things to Note
@ -630,7 +630,7 @@ Please report issues, add feature requests, and submit contributions to the
The GCP secrets engine has a full HTTP API. Please see the [GCP secrets engine API docs][api]
for more details.
[api]: /api/secret/gcp
[api]: /api-docs/secret/gcp
[cloud-creds]: https://cloud.google.com/docs/authentication/production#providing_credentials_to_your_application
[custom-roles]: https://cloud.google.com/iam/docs/creating-custom-roles
[gce]: https://cloud.google.com/compute/

View File

@ -435,7 +435,7 @@ Please report issues, add feature requests, and submit contributions to the
The Google Cloud KMS secrets engine has a full HTTP API. Please see the
[Google Cloud KMS secrets engine API docs][api] for more details.
[api]: /api/secret/gcpkms
[api]: /api-docs/secret/gcpkms
[cloud-creds]: https://cloud.google.com/docs/authentication/production#providing_credentials_to_your_application
[gce]: https://cloud.google.com/compute/
[gke]: https://cloud.google.com/kubernetes-engine/

View File

@ -143,7 +143,7 @@ The full list of template parameters is shown below:
### Token Generation
An authenticated client may request a token using the [token generation
endpoint](/api/secret/identity/tokens#generate-a-signed-id-token). The token
endpoint](/api-docs/secret/identity/tokens#generate-a-signed-id-token). The token
will be generated per the requested role's specifications, for the requester's
entity. It is not possible to generate tokens for an arbitrary entity.
@ -161,7 +161,7 @@ only requiring _access_ to Vault, not _authorization_, as the .well-known
endpoints are unauthenticated.
Alternatively, the token may be sent to Vault for verification via an
[introspection endpoint](/api/secret/identity/tokens#introspect-a-signed-id-token).
[introspection endpoint](/api-docs/secret/identity/tokens#introspect-a-signed-id-token).
The response will indicate whether the token is "active" or not, as well as any
errors that occurred during validation. Beyond simply allowing the client to
delegate verification to Vault, using this endpoint incorporates the additional
@ -183,7 +183,7 @@ an issuer that must match the request.
By default Vault will set the issuer to the Vault instance's
[`api_addr`](/docs/configuration#api_addr). This means that tokens
issued in a given cluster should be validated within that same cluster.
Alternatively, the [`issuer`](/api/secret/identity/tokens#issuer) parameter
Alternatively, the [`issuer`](/api-docs/secret/identity/tokens#issuer) parameter
may be configured explicitly. This address must point to the identity/oidc path
for the Vault instance (e.g.
`https://vault-1.example.com:8200/v1/identity/oidc`) and should be
@ -192,5 +192,5 @@ reachable by any client trying to validate identity tokens.
## API
The Identity secrets engine has a full HTTP API. Please see the
[Identity secrets engine API](/api/secret/identity) for more
[Identity secrets engine API](/api-docs/secret/identity) for more
details.

View File

@ -42,7 +42,7 @@ one is individually documented on its own page.
## API
The Identity secrets engine has a full HTTP API. Please see the
[Identity secrets engine API](/api/secret/identity) for more
[Identity secrets engine API](/api-docs/secret/identity) for more
details.
Additionally, Vault can be configured as an OIDC identity provider. Please see

View File

@ -20,11 +20,11 @@ the functionality.
The Key Management secrets engine must be configured with credentials that have sufficient
permissions to manage keys in an AWS KMS region. The authentication parameters are described
in the [credentials](/api/secret/key-management/awskms#credentials) section of the API
in the [credentials](/api-docs/secret/key-management/awskms#credentials) section of the API
documentation. The authentication parameters will be set with the following order of
precedence:
1. [KMS provider credentials](/api/secret/key-management/awskms#credentials)
1. [KMS provider credentials](/api-docs/secret/key-management/awskms#credentials)
2. Environment variables
3. Shared credentials file
4. IAM role for AWS EC2 or ECS task
@ -56,7 +56,7 @@ $ vault write keymgmt/kms/example-kms \
credentials=secret_key="bCiYmNroLxLmPNQ47VIvjlm8mQu5oktZcQdq195w"
```
Refer to the AWS KMS [API documentation](/api/secret/key-management/awskms)
Refer to the AWS KMS [API documentation](/api-docs/secret/key-management/awskms)
for a detailed description of individual configuration parameters.
## Key Transfer Specification

View File

@ -18,12 +18,12 @@ the functionality.
The Key Management secrets engine must be configured with credentials that have sufficient
permissions to manage keys in an Azure Key Vault instance. The authentication parameters are
described in the [credentials](/api/secret/key-management/azurekeyvault#credentials) section
described in the [credentials](/api-docs/secret/key-management/azurekeyvault#credentials) section
of the API documentation. The authentication parameters will be set with the following order
of precedence:
1. Environment variables
2. [KMS provider credentials](/api/secret/key-management/azurekeyvault#credentials)
2. [KMS provider credentials](/api-docs/secret/key-management/azurekeyvault#credentials)
3. [Managed Service Identity (MSI)](https://docs.microsoft.com/en-us/azure/active-directory/managed-service-identity/overview)
If the client ID or secret are not provided and Vault is running on an Azure VM, Vault will attempt
@ -54,7 +54,7 @@ $ vault write keymgmt/kms/example-kms \
credentials=tenant_id="cd4bf224-d114-4f96-9bbc-b8f45751c43f"
```
Refer to the Azure Key Vault [API documentation](/api/secret/key-management/azurekeyvault)
Refer to the Azure Key Vault [API documentation](/api-docs/secret/key-management/azurekeyvault)
for a detailed description of individual configuration parameters.
## Key Transfer Specification

View File

@ -18,12 +18,12 @@ the functionality.
The Key Management secrets engine must be configured with credentials that have sufficient
permissions to manage keys in an existing GCP Cloud KMS [key ring](https://cloud.google.com/kms/docs/resource-hierarchy#key_rings).
The authentication parameters are described in the [credentials](/api/secret/key-management/gcpkms#credentials)
The authentication parameters are described in the [credentials](/api-docs/secret/key-management/gcpkms#credentials)
section of the API documentation. The authentication parameters will be set with the following order
of precedence:
1. `GOOGLE_CREDENTIALS` environment variable
2. [KMS provider credentials](/api/secret/key-management/gcpkms#credentials) parameter
2. [KMS provider credentials](/api-docs/secret/key-management/gcpkms#credentials) parameter
3. [Application default credentials](https://cloud.google.com/docs/authentication/production)
The service account must be authorized with the following minimum
@ -50,7 +50,7 @@ $ vault write keymgmt/kms/example-kms \
credentials=service_account_file="/path/to/service_account/credentials.json"
```
Refer to the GCP Cloud KMS [API documentation](/api/secret/key-management/gcpkms)
Refer to the GCP Cloud KMS [API documentation](/api-docs/secret/key-management/gcpkms)
for a detailed description of individual configuration parameters.
## Key Transfer Specification

View File

@ -89,7 +89,7 @@ manage the lifecycle of cryptographic keys in [supported KMS providers](#kms-pro
`purpose` and `protection`. The `purpose` defines the set of cryptographic capabilities
that the key will have in the KMS provider. The `protection` defines where cryptographic
operations are performed with the key in the KMS provider. See the API documentation for a list of
supported [purpose](/api/secret/key-management#purpose) and [protection](/api/secret/key-management#protection)
supported [purpose](/api-docs/secret/key-management#purpose) and [protection](/api-docs/secret/key-management#protection)
values.
~> **Note:** The amount of time it takes to distribute a key to a KMS provider is proportional to the
@ -126,7 +126,7 @@ manage the lifecycle of cryptographic keys in [supported KMS providers](#kms-pro
This operation results in the key being deleted from the KMS provider. The key will still exist
in the secrets engine and can be redistributed to a KMS provider at a later time.
To permanently delete the key from the secrets engine, the [delete key](/api/secret/key-management#delete-key)
To permanently delete the key from the secrets engine, the [delete key](/api-docs/secret/key-management#delete-key)
API may be invoked.
## Key Types
@ -174,5 +174,5 @@ a step-by-step tutorial.
## API
The Key Management secrets engine has a full HTTP API. Please see the
[Key Management Secrets Engine API](/api/secret/key-management) for more
[Key Management Secrets Engine API](/api-docs/secret/key-management) for more
details.

View File

@ -107,5 +107,5 @@ guide for a step-by-step tutorial.
## API
The KV secrets engine has a full HTTP API. Please see the
[KV secrets engine API](/api/secret/kv/kv-v1) for more
[KV secrets engine API](/api-docs/secret/kv/kv-v1) for more
details.

View File

@ -156,7 +156,7 @@ The `allowed_parameters`, `denied_parameters`, and `required_parameters` fields
not supported for policies used with the version 2 kv store. See the [Policies Concepts](/docs/concepts/policies)
for a description of these parameters.
See the [API Specification](/api/secret/kv/kv-v2) for more
See the [API Specification](/api-docs/secret/kv/kv-v2) for more
information.
## Usage
@ -543,5 +543,5 @@ guide for a step-by-step tutorial.
## API
The KV secrets engine has a full HTTP API. Please see the
[KV secrets engine API](/api/secret/kv/kv-v2) for more
[KV secrets engine API](/api-docs/secret/kv/kv-v2) for more
details.

View File

@ -14,7 +14,7 @@ time-based and are automatically revoked when the Vault lease expires, unless re
Vault will create a Programmatic API key for each lease that provide appropriate access to the defined MongoDB Atlas
project or organization with appropriate role(s). The MongoDB Atlas Programmatic API Key Public and
Private Keys are returned to the caller. To learn more about Programmatic API Keys visit the
[Programmatic API Keys Doc](https://docs.atlas.mongodb.com/reference/api/apiKeys/).
[Programmatic API Keys Doc](https://docs.atlas.mongodb.com/reference/api-docs/apiKeys/).
## Setup
@ -35,7 +35,7 @@ steps are usually completed by an operator or configuration management tool.
or project that has sufficient permissions to allow Vault to create other Programmatic API Keys.
In order to grant Vault programmatic access to an organization or project using only the
[API](https://docs.atlas.mongodb.com/api/) you need to create a MongoDB Atlas Programmatic API
[API](https://docs.atlas.mongodb.com/api-docs/) you need to create a MongoDB Atlas Programmatic API
Key with the appropriate roles if you have not already done so. A Programmatic API Key consists
of a public and private key, so ensure you have both. Regarding roles, the Organization Owner and
Project Owner roles should be sufficient for most needs, however be sure to check what each role
@ -104,7 +104,7 @@ $ vault write mongodbatlas/roles/test \
~> **Note:** MongoDB Atlas has deprecated whitelists, and the API will be disabled in June 2021. It is replaced by a
similar access list API which is live now. If you specify CIDR blocks or IP addresses to allow, you need to run **Vault
1.6.3 or greater** to avoid interruption. See [MongoDB Atlas documentation](https://docs.atlas.mongodb.com/reference/api/access-lists/)
1.6.3 or greater** to avoid interruption. See [MongoDB Atlas documentation](https://docs.atlas.mongodb.com/reference/api-docs/access-lists/)
for further details.
Programmatic API Key access can and should be limited with a IP Network Access list. In the following example both a CIDR
@ -188,4 +188,4 @@ $ vault read mongodbatlas/creds/test
## API
The MongoDB Atlas secrets engine has a full HTTP API. Please see the
[MongoDB Atlas secrets engine API docs](/api/secret/mongodbatlas) for more details.
[MongoDB Atlas secrets engine API docs](/api-docs/secret/mongodbatlas) for more details.

View File

@ -119,5 +119,5 @@ step-by-step tutorial.
## API
The Nomad secret backend has a full HTTP API. Please see the
[Nomad secret backend API](/api/secret/nomad) for more
[Nomad secret backend API](/api-docs/secret/nomad) for more
details.

View File

@ -693,5 +693,5 @@ guide for a step-by-step tutorial.
## API
The PKI secrets engine has a full HTTP API. Please see the
[PKI secrets engine API](/api/secret/pki) for more
[PKI secrets engine API](/api-docs/secret/pki) for more
details.

View File

@ -94,7 +94,7 @@ the proper permission, it can generate credentials.
## API
The RabbitMQ secrets engine has a full HTTP API. Please see the
[RabbitMQ secrets engine API](/api/secret/rabbitmq) for more
[RabbitMQ secrets engine API](/api-docs/secret/rabbitmq) for more
details.
[rmq-perms]: https://www.rabbitmq.com/management.html#permissions

View File

@ -189,5 +189,5 @@ username@<IP of remote host>:~$
## API
The SSH secret secrets engine has a full HTTP API. Please see the
[SSH secret secrets engine API](/api/secret/ssh) for more
[SSH secret secrets engine API](/api-docs/secret/ssh) for more
details.

View File

@ -29,5 +29,5 @@ All guides assume a basic familiarity with the SSH protocol.
## API
The SSH secrets engine has a full HTTP API. Please see the
[SSH secrets engine API](/api/secret/ssh) for more
[SSH secrets engine API](/api-docs/secret/ssh) for more
details.

View File

@ -116,5 +116,5 @@ for a step-by-step tutorial.
## API
The SSH secrets engine has a full HTTP API. Please see the
[SSH secrets engine API](/api/secret/ssh) for more
[SSH secrets engine API](/api-docs/secret/ssh) for more
details.

View File

@ -505,5 +505,5 @@ forwarding. See [no prompt after login](#no-prompt-after-login) for examples.
## API
The SSH secrets engine has a full HTTP API. Please see the
[SSH secrets engine API](/api/secret/ssh) for more
[SSH secrets engine API](/api-docs/secret/ssh) for more
details.

View File

@ -55,7 +55,7 @@ management tool.
and manages the lifecycle of that API token. You will need to know the User
ID in order to generate User API tokens for that user. You can use the
Terraform Cloud [Account
API](https://www.terraform.io/docs/cloud/api/account.html) to find the
API](https://www.terraform.io/docs/cloud/api-docs/account.html) to find the
desired User ID.
```shell-session
@ -167,5 +167,5 @@ for a step-by-step tutorial.
## API
The Terraform Cloud secrets engine has a full HTTP API. Please see the
[Terraform Cloud secrets engine API](/api/secret/terraform) for more
[Terraform Cloud secrets engine API](/api-docs/secret/terraform) for more
details.

View File

@ -120,5 +120,5 @@ management tool.
## API
The TOTP secrets engine has a full HTTP API. Please see the
[TOTP secrets engine API](/api/secret/totp) for more
[TOTP secrets engine API](/api-docs/secret/totp) for more
details.

View File

@ -346,5 +346,5 @@ Refer to the [Transform Secrets Engine](https://learn.hashicorp.com/vault/adp/tr
## API
The Transform secrets engine has a full HTTP API. Please see the
[Transform secrets engine API](/api/secret/transform) for more
[Transform secrets engine API](/api-docs/secret/transform) for more
details.

View File

@ -241,5 +241,5 @@ guide for a step-by-step tutorial.
## API
The Transit secrets engine has a full HTTP API. Please see the
[Transit secrets engine API](/api/secret/transit) for more
[Transit secrets engine API](/api-docs/secret/transit) for more
details.

View File

@ -300,6 +300,6 @@ To see all of the options available when requesting a certificate, including
## API
Venafi Machine Identity Secrets Engine uses the same
[Vault API](/api/secret/pki)
[Vault API](/api-docs/secret/pki)
as the built-in PKI secrets engine. Some methods, such as those for
managing certificate authorities, do not apply.

View File

@ -38,4 +38,4 @@ instance or through a load balancer can result in mismatched
plugin binaries within a cluster. On a replicated cluster this may be accomplished
by setting the 'scope' parameter of the reload to 'global'.
[plugin_reload_api]: /api/system/plugins-reload-backend
[plugin_reload_api]: /api-docs/system/plugins-reload-backend

View File

@ -15,9 +15,9 @@ for Vault 0.10.2 compared to 0.10.1. Please read it carefully.
If you are using `transit`'s convergent encryption feature, which prior to this
release was at version 2, we recommend
[rotating](/api/secret/transit#rotate-key)
[rotating](/api-docs/secret/transit#rotate-key)
your encryption key (the new key will use version 3) and
[rewrapping](/api/secret/transit#rewrap-data)
[rewrapping](/api-docs/secret/transit#rewrap-data)
your data to mitigate the chance of offline plaintext-confirmation attacks.
### PKI duration return types

View File

@ -136,9 +136,9 @@ allowing it to be set manually didn't make sense.
If you are using `transit`'s convergent encryption feature, which prior to this
release was at version 2, we recommend
[rotating](/api/secret/transit#rotate-key)
[rotating](/api-docs/secret/transit#rotate-key)
your encryption key (the new key will use version 3) and
[rewrapping](/api/secret/transit#rewrap-data)
[rewrapping](/api-docs/secret/transit#rewrap-data)
your data to mitigate the chance of offline plaintext-confirmation attacks.
### PKI duration return types

View File

@ -38,7 +38,7 @@ each status code (including `500`).
Root tokens (tokens with the `root` policy) can no longer be created except by
another root token or the
[`generate-root`](/api/system/generate-root)
[`generate-root`](/api-docs/system/generate-root)
endpoint or CLI command.
## PKI Backend Certificates Will Contain Default Key Usages

View File

@ -49,4 +49,4 @@ is performing an explicit reindex.
This path was meant to require `sudo` capability but was not implemented this
way. It now requires `sudo` capability to run.
[reindex]: /api/system/replication#reindex-replication
[reindex]: /api-docs/system/replication#reindex-replication

View File

@ -117,5 +117,5 @@ corresponding object containing the `key_type`.
Audit request and response entries are still in RFC3339 format but now have a
granularity of nanoseconds.
[generate-root]: /api/secret/pki#generate-root
[generate-root]: /api-docs/secret/pki#generate-root
[pkcs11-seal]: /docs/configuration/seal/pkcs11

View File

@ -38,14 +38,14 @@ token roles. When creating a role, the key parameter is required and the key
must exist. Previously, it was possible to create a role and assign it a named
key that did not yet exist despite the documentation stating otherwise.
All calls to [create or update a role](https://www.vaultproject.io/api/secret/identity/tokens#create-or-update-a-role)
All calls to [create or update a role](https://www.vaultproject.io/api-docs/secret/identity/tokens#create-or-update-a-role)
must be checked to ensure that roles are not being created or updated with
non-existent keys.
## SSH Role Parameter `allowed_extensions` Behavior Change
Prior versions of Vault allowed clients to specify any extension when requesting
SSH certificate [signing requests](https://www.vaultproject.io/api/secret/ssh#sign-ssh-key)
SSH certificate [signing requests](https://www.vaultproject.io/api-docs/secret/ssh#sign-ssh-key)
if their role had an `allowed_extensions` set to `""` or was missing.
Now, Vault will reject a client request that specifies extensions if the role