docs/doc/source/security/kubernetes/security-vault-overview.rst
Keane Lim 3c5fa979a4 Security guide update
Re-organized topic hierarchy

Tiny edit to restart review workflow.

Squashed with Resolved index.rst conflict commit

Change-Id: I13472792cb19d1e9975ac76c6954d38054d606c5
Signed-off-by: Keane Lim <keane.lim@windriver.com>
Signed-off-by: MCamp859 <maryx.camp@intel.com>
2021-03-12 15:10:40 -05:00

47 lines
1.5 KiB
ReStructuredText

.. mab1596215747624
.. _security-vault-overview:
==============
Vault Overview
==============
|prod| integrates open source Vault containerized security application
\(Optional\) into the |prod| solution, that requires |PVCs| as a storage
backend to be enabled.
Vault is a containerized secrets management application that provides
encrypted storage with policy-based access control and supports multiple
secrets storage engines and auth methods.
|prod| includes a Vault-manager container to handle initialization of the
Vault servers. Vault-manager also provides the ability to automatically
unseal Vault servers in deployments where an external autounseal method
cannot be used. For more information, see, `https://www.vaultproject.io/
<https://www.vaultproject.io/>`__.
There are two methods for using Vault secrets with hosted applications:
.. _security-vault-overview-ul-ekx-y4m-4mb:
- The first method is to have the application be Vault Aware and retrieve
secrets using the Vault REST API. This method is used to allow an
application to write secrets to Vault, provided the applicable policy gives
write permission at the specified Vault path.
.. xbooklink
For more information, see |usertasks-doc|: :ref:`Vault Aware <vault-aware>`.
- The second method is to have the application be Vault Unaware and use
the Vault Agent Injector to make secrets available on the container
filesystem.
.. xbooklink
For more information, see, |usertasks-doc|: :ref:`Vault Unaware <vault-unaware>`.