Hi Navin,
Jason's answer was excellent, so I'm just going to add two things onto it:
1) Jason didn't mention the PGP support for unseal keys, but it's a
great way to ensure that nobody copies down more than one key.
2) A really nice benefit to manually unsealing is that you can have a
process to ensure that the Vault binary being run is unmodified from
your expectations. Vault is open source, and a malicious party could
easily modify it to bad things. By allowing unseal key holders to
verify the binary before providing their key (for instance, with a
SHA256 sum against an expected value) you can know that what you're
running is what you're expecting to run.
Best,
Jeff
> --
> This mailing list is governed under the HashiCorp Community Guidelines -
>
https://www.hashicorp.com/community-guidelines.html. Behavior in violation
> of those guidelines may result in your removal from this mailing list.
>
> GitHub Issues:
https://github.com/hashicorp/vault/issues
> IRC: #vault-tool on Freenode
> ---
> You received this message because you are subscribed to the Google Groups
> "Vault" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to
vault-tool+...@googlegroups.com.
> To view this discussion on the web visit
>
https://groups.google.com/d/msgid/vault-tool/bd81e01a-85a0-473c-8f03-bc9781dc413a%40googlegroups.com.
>
> For more options, visit
https://groups.google.com/d/optout.