Skip to content

Latest commit

 

History

History
19 lines (11 loc) · 1.02 KB

encryption.md

File metadata and controls

19 lines (11 loc) · 1.02 KB

Encryption Backends

Encryption backends are used to encrypt the root tokens and unseal keys generated during the Vault initialization process. The same backend should always be used for each initialization of Vault, as each backend can only decrypt data encrypted by itself. These backends are to be specified via the vault-init CLI, using the --encryption flag followed by its name (eg. --encryption=local).

The implementation of these encryption backends can be found under pkg/encryption.

Local (local)

The local encryption backend uses the AES-GCM encryption algorithm as implemented in the crpyto package found in Go's standard library.

Configuration

  • --encryption-local-secret-key: The 32-byte secret key to use for encrypting root tokens and unseal keys.

You can use OpenSSL to generate a secure 32-byte secret key:

openssl rand -base64 24