

Vault pulls its encrypted master key from storage and moves it through the Cloud Hyper Protect Crypto Service for decryption via PKCS #11 / Cryptoki API. Unsealing is the process of obtaining the plaintext master key necessary to read the decryption key to decrypt the data, allowing access to the Vault.
Enterprise vault plugin how to#
In this state, Vault is configured to know where and how to access the physical storage, but doesn’t know how to decrypt any of it. When a Vault server is started, it starts in a sealed state. Vault protects its database in storage with a Vault-Master Key, which is also held in storage on the Vault Enterprise Server.
Enterprise vault plugin update#
Security teams can change passwords, rotate credentials, and update policies without coordinating across the organization. Vault allows teams to consume the data they need without coordinating with security teams. It also provides a highly available and secure way of storing and exposing secrets to applications and users such as encryption keys, API tokens, and database credentials. Vault provides a centralized approach to secrets-management across every element of the application delivery lifecycle. IBM Cloud Hyper Protect Crypto Service provides access to a cloud-based HSM that is FIPS 140-2 Level 4 certified and allows an interface using Enterprise PKCS#11 (ep11) that Vault Enterprise uses for both auto-unseal and seal wrapping capabilities to conform to the key storage and key transport requirements under the FIPS 140-2 compliance.


Stringent industry compliance requirements make selecting the best hardware security module (HSM) for integration with privileged access management security products such as HashiCorp Vault Enterprise a primary concern for businesses.
