Join David Swersky for an in-depth discussion in this video Vault response wrapping, part of Learning HashiCorp Vault.
- [Instructor] Now take a moment to demonstrate…response wrapping.…We've seen the Vault token create command,…and if we use that it will return a token that we can use…associated with a policy to authenticate to Vault.…Response wrapping uses the cubbyhole secrets engine.…Instead of returning the token that we used to authenticate,…we get a temporary token called a wrapping token.…The way to do that is to execute the same command…with a different parameter.…Vault token create wrap-ttl,…and we'll make it five minutes.…
This tells Vault to return a wrapping token…and put the actual token into a cubbyhole…for us to retrieve later.…We also need to set a policy.…I'll use the Jenkins policy that we used earlier.…We see, in this case, instead of the actual token,…we receive a wrapping token.…The actual token has been placed in a cubbyhole,…and we can unwrap this by executing Vault unwrap,…and then copy the value of the wrapping token…and paste it in.…
We now get the actual token form the cubbyhole.…Vault has now destroyed that cubbyhole.…
- What is Vault?
- Using the dev server
- Working with Vault secrets engines
- Adding policies to Vault
- Running and using Vault
- Configuring the database secrets engine
- Implementing Vault
- Integrating Jenkins with Vault
- Using the Vault API
Skill Level Beginner
1. Introduction to Vault
2. Getting Started with Vault
3. Running and Using Vault
4. Implementing Vault
5. Using the Vault API
Next steps with Vault1m 23s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.