Namespaces
A Vault Namespace is a logical grouping mechanism within Vault that allows the separation of policies, authentication methods, secrets engines, and other configurations. Essentially, it divides a Vault deployment into different environments or organisational units, providing isolation and control over access and operations. Namespaces allow teams or departments to manage their secrets and configurations independently within a shared Vault infrastructure, improving security and governance.
Create a namespace at the path education/
:
education/
:Headers
X-Vault-token
Response
List all namespaces:
Headers
X-Vault-token
Response
Lookup the namespace information at path education/
:
education/
:Headers
X-Vault-token
Response
Delete the namespace at path education/
:
education/
:Headers
X-Vault-token
Response
Accessing a namespace:
Users can access namespaces by specifying the namespace in the Vault CLI commands or API requests using the -namespace
flag or parameter.
Headers
X-Vault-token
X-Vault-Namespace
education
Response
Managing policies within a namespace:
Create a policy specific to the "education" namespace:
Headers
X-Vault-token
X-Vault-Namespace
education
Body
Response
Using secrets engines:
Mount a secrets engine named "kv" within the "education" namespace:
Headers
X-Vault-token
X-Vault-Namespace
education
Body
Response
Creating secrets in KV secrets engine:
You can write a secret to the KV secrets engine. For example, let's add a username and password:
Headers
X-Vault-token
X-Vault-Namespace
education
Body
Response
Last updated