HashiCorp Vault
A tool for secrets management.
Vault stores and tightly controls access to secrets such as API keys, passwords, certificates, and database credentials. The data path is encrypted with a master key that is split using Shamir's Secret Sharing, which means unsealing a Vault server requires several key shards held by different operators.
Vault's distinctive feature is dynamic secrets: instead of storing a long-lived database password and rotating it periodically, applications request a short-lived credential from Vault, which provisions one in the database, hands it back, and revokes it after a TTL. The same model applies to AWS IAM credentials, SSH session certificates, PKI certificates, and many other backends.
HashiCorp's licence change in 2023 from MPL-2.0 to BSL-1.1 prompted the OpenBao fork under the Linux Foundation, which continues the original MPL-licensed direction. Vault remains the dominant secrets-management server in HashiCorp-aligned environments, and OpenBao is gaining traction in organisations that need a clearly open-source licence.
Install
Debian/Ubuntu: sudo apt install vault # via HashiCorp APT repo Fedora/RHEL: sudo dnf install vault Arch: sudo pacman -S vault macOS: brew install vault
Authors
- HashiCorp
- Vault contributors