Skip to content

Commit f303207

Browse files
committed
wip
1 parent c970433 commit f303207

File tree

1 file changed

+18
-0
lines changed

1 file changed

+18
-0
lines changed

vault/README.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,3 +9,21 @@ With a modular design based around a growing plugin ecosystem, Vault lets you in
99
### 1.1. Seal/Unseal
1010

1111
When you start a Vault server, it starts in a sealed state. In this state, Vault can access the physical storage, but it cannot decrypt any of the data on it. Unsealing is the process of obtaining the plaintext root key that is necessary to read the decryption key.
12+
13+
Vault encrypts most data using the encryption key in the keyring <- to get the keyring, Vault uses the root key to decrypt it <- the root key itself requires the unseal key to decrypt it.
14+
15+
**Shamir seals**
16+
17+
![](https://web-unified-docs-hashicorp.vercel.app/api/assets/vault/latest/img/vault-shamir-seal.png)
18+
19+
Vault uses an algorithm known as Shamir's Secret Sharing to split the key into shares. Vault requires a certain threshold of shares to reconstruct the unseal key. Vault operators add shares one at a time in any order until Vault has enough shares to reconstruct the key. Then, Vault uses the unseal key to decrypt the root key.
20+
21+
Once you unseal a Vault node, it remains unsealed until one of the following happens:
22+
23+
1. You reseal it using the API.
24+
2. You restart the server.
25+
3. Vault's storage layer encounters an unrecoverable error.
26+
27+
## 2. Lease, renew, and revoke
28+
29+
With every dynamic secret and `service` type authentication token, Vault creates a _lease_: metadata containing information such as a time duration, renewability, and more.

0 commit comments

Comments
 (0)