@@ -1397,6 +1397,41 @@ This Auto-unseal mechanism is Open Source in Vault 1.0 but would require Enterpr
1397
1397
- The CryptoKey's name. A CryptoKey's name must be unique within a location and match the regular expression [a-zA-Z0-9_-]{1,63}
1398
1398
- Default value: vault_key
1399
1399
1400
+ ## Vault OCI KMS Auto-unseal
1401
+
1402
+ This feature enabled operators to delegate the unsealing process to OCI KMS to ease operations in the event of a partial failure and to
1403
+ aid in the creation of new or ephemeral clusters.
1404
+
1405
+ ### `vault_ocikms`
1406
+
1407
+ - Set to true to enable OCI KMS Auto-unseal.
1408
+ - Default value: false
1409
+
1410
+ ### `vault_ocikms_backend`
1411
+
1412
+ - Backend seal template filename.
1413
+ - Default value: `vault_seal_ocikms.j2`
1414
+
1415
+ ### `vault_ocikms_auth_type_api_key`
1416
+
1417
+ - Specifies if using API key to authenticate to OCI KMS service.
1418
+ - Default value: false
1419
+
1420
+ ### `vault_ocikms_key_id`
1421
+
1422
+ - The OCI KMS key ID to use.
1423
+ - Default value: VAULT_OCIKMS_SEAL_KEY_ID
1424
+
1425
+ ### `vault_ocikms_crypto_endpoint`
1426
+
1427
+ - The OCI KMS cryptographic endpoint (or data plane endpoint) to be used to make OCI KMS encryption/decryption requests.
1428
+ - Default value: VAULT_OCIKMS_CRYPTO_ENDPOINT
1429
+
1430
+ ### `vault_ocikms_management_endpoint`
1431
+
1432
+ - The OCI KMS management endpoint (or control plane endpoint) to be used to make OCI KMS key management requests.
1433
+ - Default value: VAULT_OCIKMS_MANAGEMENT_ENDPOINT
1434
+
1400
1435
## Vault Transit Auto-unseal
1401
1436
This enables Vault to use another Vault instance for the unseal process using its transit secret engine
1402
1437
0 commit comments