1.9 KiB
1.9 KiB
layout | page_title | sidebar_current | description |
---|---|---|---|
guides | Vault Configuration - Guides | guides-configuration | Once a Vault instance has been installed, the next step is to configure auth backend, secret backend, and manage keys. Vault configuration guides addresses key concepts in configuring your Vault servers. |
Vault Configuration
This guide walks you through Vault configuration topics. Some guides address fundamental tasks to get the server setup, and some guides introduce more advanced discussions.
- Policies are used to instrument
Role-Based Access Control (RBAC) by specifying access privileges. Authoring of
policies is probably the first step the Vault administrator performs. This guide
walks you through creating example policies for
admin
andprovisioner
users. - AppRole Pull Authentication guide is an introductory guide introduces the steps to generate tokens for machines or apps by enabling AppRole auth backend.
- Token and Leases guide helps you understand how tokens and leases work in Vault. The understanding of the lease hierarchy and expiration mechanism helps you plan for break glass procedures and more.
- Root Token Generation guide demonstrates the workflow of regenerating root tokens. It is considered to be a best practice not to persist the initial root token. If a root token needs to be regenerated, this guide helps you walk through the task.
- Rekeying & Rotating guide provides a high-level overview of Shamir's Secret Sharing Algorithm, and how to perform rekey and rotate operations in Vault.
- Building Plugin Backends guide provides steps to build, register, and mount non-database external plugin backends.