189 lines
4.2 KiB
JSON
189 lines
4.2 KiB
JSON
[
|
|
{
|
|
"title": "Getting Started",
|
|
"path": "getting-started"
|
|
},
|
|
{
|
|
"title": "Vault Operations",
|
|
"routes": [
|
|
{
|
|
"title": "Overview",
|
|
"path": "operations"
|
|
},
|
|
{
|
|
"title": "Reference Architecture",
|
|
"path": "operations/reference-architecture"
|
|
},
|
|
{
|
|
"title": "Vault HA with Consul",
|
|
"path": "operations/vault-ha-consul"
|
|
},
|
|
{
|
|
"title": "Production Hardening",
|
|
"path": "operations/production"
|
|
},
|
|
{
|
|
"title": "Root Token Generation",
|
|
"path": "operations/generate-root"
|
|
},
|
|
{
|
|
"title": "Rekeying & Rotating",
|
|
"path": "operations/rekeying-and-rotating"
|
|
},
|
|
{
|
|
"title": "Building Plugin Backends",
|
|
"path": "operations/plugin-backends"
|
|
},
|
|
{
|
|
"divider": true
|
|
},
|
|
{
|
|
"title": "Replication Setup & Guidance",
|
|
"path": "operations/replication"
|
|
},
|
|
{
|
|
"title": "Disaster Recovery Setup",
|
|
"path": "operations/disaster-recovery"
|
|
},
|
|
{
|
|
"title": "Mount Filter",
|
|
"path": "operations/mount-filter"
|
|
},
|
|
{
|
|
"title": "Multi-Tenant: Namespaces",
|
|
"path": "operations/multi-tenant"
|
|
},
|
|
{
|
|
"title": "Vault Auto-unseal with AWS KMS",
|
|
"path": "operations/autounseal-aws-kms"
|
|
},
|
|
{
|
|
"title": "Seal Wrap / FIPS 140-2",
|
|
"path": "operations/seal-wrap"
|
|
},
|
|
{
|
|
"title": "Vault Cluster Monitoring",
|
|
"path": "operations/monitoring"
|
|
},
|
|
{
|
|
"title": "Vault Deployment Guide",
|
|
"path": "operations/deployment-guide"
|
|
},
|
|
{
|
|
"title": "Performance Standby Nodes",
|
|
"path": "operations/performance-nodes"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"title": "Identity and Access Management",
|
|
"routes": [
|
|
{
|
|
"title": "Overview",
|
|
"path": "identity"
|
|
},
|
|
{
|
|
"title": "Secure Introduction of Vault Clients",
|
|
"path": "identity/secure-intro"
|
|
},
|
|
{
|
|
"title": "Policies",
|
|
"path": "identity/policies"
|
|
},
|
|
{
|
|
"title": "ACL Policy Path Templating",
|
|
"path": "identity/policy-templating"
|
|
},
|
|
{
|
|
"title": "AppRole Pull Authentication",
|
|
"path": "identity/authentication"
|
|
},
|
|
{
|
|
"title": "AppRole with Terraform and Chef",
|
|
"path": "identity/approle-trusted-entities"
|
|
},
|
|
{
|
|
"title": "Tokens and Leases",
|
|
"path": "identity/lease"
|
|
},
|
|
{
|
|
"title": "Identity - Entities & Groups",
|
|
"path": "identity/identity"
|
|
},
|
|
{
|
|
"divider": true
|
|
},
|
|
{
|
|
"title": "Sentinel Policies",
|
|
"path": "identity/sentinel"
|
|
},
|
|
{
|
|
"title": "Control Groups",
|
|
"path": "identity/control-groups"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"title": "Secrets Management",
|
|
"routes": [
|
|
{
|
|
"title": "Overview",
|
|
"path": "secret-mgmt"
|
|
},
|
|
{
|
|
"title": "Static Secrets",
|
|
"path": "secret-mgmt/static-secrets"
|
|
},
|
|
{
|
|
"title": "Versioned KV Secret Engine",
|
|
"path": "secret-mgmt/versioned-kv"
|
|
},
|
|
{
|
|
"title": "Secret as a Service",
|
|
"path": "secret-mgmt/dynamic-secrets"
|
|
},
|
|
{
|
|
"title": "DB Root Credential Rotation",
|
|
"path": "secret-mgmt/db-root-rotation"
|
|
},
|
|
{
|
|
"title": "Cubbyhole Response Wrapping",
|
|
"path": "secret-mgmt/cubbyhole"
|
|
},
|
|
{
|
|
"title": "One-Time SSH Password",
|
|
"path": "secret-mgmt/ssh-otp"
|
|
},
|
|
{
|
|
"title": "Build Your Own CA",
|
|
"path": "secret-mgmt/pki-engine"
|
|
},
|
|
{
|
|
"title": "Direct Application Integration",
|
|
"path": "secret-mgmt/app-integration"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"title": "Encryption as a Service",
|
|
"routes": [
|
|
{
|
|
"title": "Overview",
|
|
"path": "encryption"
|
|
},
|
|
{
|
|
"title": "Encryption as a Service",
|
|
"path": "encryption/transit"
|
|
},
|
|
{
|
|
"title": "Java Application Demo",
|
|
"path": "encryption/spring-demo"
|
|
},
|
|
{
|
|
"title": "Transit Secrets Re-wrapping",
|
|
"path": "encryption/transit-rewrap"
|
|
}
|
|
]
|
|
}
|
|
]
|