Key management

HashiCorp Vault - Managed Keys

2min

This document provides information regarding the configuration of the HSM with HashiCorp Vault's Managed Keys feature by using PKCS #11 libraries. For additional questions related to your HSM, see the relevant user guide.

Application description

From the HashiCorp Vault documentation website: Within certain environments, customers want to leverage key management systems external to Vault, when handling, storing, and interacting with private key material, or are required to do so by standards requirements.

To satisfy these requirements, Vault has a centralized abstraction called Managed Keys that different secrets engines can plug into, allowing them to delegate these operations to a trusted external KMS.

Minimally, a managed key consists of a named managed key entry managed by the sys/managed-key API. Besides a name, there are backend-specific configurations to access the key in question.

For PKCS #11 (HSM) backed managed keys, the managed key configuration must reference a kms library stanza which points to a PKCS #11 access library on the host machine.

Note that a configured, named managed key corresponds to a single key within a backend. More than one managed key can be configured targeting a single backend by creating multiple managed keys with the API.

Guardian integration