Skip to content

Commit

Permalink
backport of commit 1196b8e (#28899)
Browse files Browse the repository at this point in the history
Co-authored-by: Steven Clark <[email protected]>
  • Loading branch information
1 parent e756a3c commit 72b88ef
Show file tree
Hide file tree
Showing 2 changed files with 7 additions and 0 deletions.
3 changes: 3 additions & 0 deletions website/content/api-docs/system/managed-keys.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -85,6 +85,9 @@ $ curl \
- `allow_generate_key` `(string: "false")` - If no existing key can be found in the referenced backend, instructs
Vault to generate a key within the backend.

~> **NOTE**: Once the initial key creation has occurred, it is advisable to disable this flag to prevent any
unintended key creation in the future.

- `allow_replace_key` `(string: "false")` - Controls the ability for Vault to replace through generation or importing
a key into the configured backend even if a key is present, if set to false those operations are forbidden
if a key exists.
Expand Down
4 changes: 4 additions & 0 deletions website/content/docs/configuration/seal/pkcs11.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -156,6 +156,10 @@ These parameters apply to the `seal` stanza in the Vault configuration file:
circumstances, such as if proprietary vendor extensions are required to
create keys of a suitable type.

~> **NOTE**: Once the initial key creation has occurred post cluster
initialization, it is advisable to disable this flag to prevent any
unintended key creation in the future.

- `force_rw_session` `(string: "false")`: Force all operations to open up
a read-write session to the HSM. This is a boolean expressed as a string (e.g.
`"true"`). May also be specified by the `VAULT_HSM_FORCE_RW_SESSION` environment
Expand Down

0 comments on commit 72b88ef

Please sign in to comment.