The Vault team is announcing the release candidate for 1.15 and the release of Vault 1.14.3, 1.13.7, and 1.12.11.
Community Edition binaries can be downloaded at [1, 2, 3, 12]. Enterprise binaries are available to customers as well.
As a reminder, if you believe you have found a security issue in Vault, please responsibly disclose by emailing secu...@hashicorp.com and do not use the public issue tracker. Our security policy and our PGP key can be found at .
The major features and improvements in the 1.15 release are:
Azure Workload Identity Federation: The Azure Auth plugin now supports Azure’s Workload Identity Federation (WIF). The Vault Agent has also added auto-auth support for Azure WIF.
Event System (Beta): This update adds support for Vault clustering and replication configurations, subscribing to multiple namespaces, filtering, and policy enforcement. Pre-defined events are currently limited to the KV secrets engine, with extensions to other engines Vault subsystems planned. External plugins are now able to generate events. This feature is not suitable for production use while in beta.
Plugin Containers (Beta): External plugins can now optionally be run in their own containers on Linux. This requires Vault to have access to a container runtime. This feature is not suitable for production use while in beta.
Secrets Sync (Enterprise, Beta): Introduce the ability for Vault Enterprise to sync KVv2 secrets from Vault to third-party destinations such as AWS Secrets Manager, Azure Key Vault, GCP Secret Manager, GitHub Secrets, and Vercel.
SAML Auth Method (Enterprise): Enable users to authenticate with Vault using their identity in a SAML Identity Provider.
Advanced TTL Management on Database Engine: The Database Engine now supports rotating static secrets through a schedule-based rotation mechanism. The schedule can be specified as a cron-style parameter, and is mutually exclusive with the existing rotation period mechanism for static roles.
Inherited Quotas: Rate limit and lease count quotas set on a namespace can now be configured to apply to that namespace and all of its children namespaces.
Reindex Improvements (Enterprise): Reindexing should have reduced downtime.
X509 Certificates in Transit: Support signing CSRs and rotating signed certificates matching key material within Transit, allowing, for example, for code signing certificates with the Notary Project to be stored adjacent to their key material. This feature was contributed by the community.
PKI CIEPS: Certificate Issuance External Policy Service enables customers to configure an external service that Vault PKI will use to validate, augment, and approve certificate requests.
Seal HA (Enterprise, Beta): Allows users to configure more than one seal for auto-unseal and seal wrapping high availability. This feature is not yet suitable for production use.
Dashboard UI: The new Vault landing page introduces enhanced functionality by enabling users to quickly perform actions, access data and surfaces basic Client Count and Replication information for enterprise users.
LDAP Secrets Engine UI: Within the Vault UI, users can enable the LDAP secrets engine and connect to their existing OpenLDAP, Active Directory (AD), or Resource Access Control Facility (RACF) systems. The UI provides a centralized workflow for efficiently managing LDAP roles, setting shared library accounts/credentials, and automatic password rotations.
Copyable KV v2 paths in UI: Provides users with the path of a given secret to copy and use directly in API or CLI commands.
Improved KV V2 UI: Refactored the KV v2 secrets engine, fixing known bugs and improving functionality such as version diff and secret deletion.
See the Changelog at  for the full list of improvements and bug fixes.
See the Feature Deprecation Notice and Plans page  for our upcoming feature deprecation plans.
Community  and Enterprise  Docker images will be available soon.
See  for general upgrade instructions, and  for upgrade instructions and known issues.
As always, we recommend upgrading and testing this release in an isolated environment. If you experience any non-security issues, please report them on the Vault GitHub issue tracker or post to the Vault Discuss Forum at .
We hope you enjoy Vault 1.15!
Sincerely, The Vault Team