--
This mailing list is governed under the HashiCorp Community Guidelines - https://www.hashicorp.com/community-guidelines.html. Behavior in violation of those guidelines may result in your removal from this mailing list.
GitHub Issues: https://github.com/hashicorp/vault/issues
IRC: #vault-tool on Freenode
---
You received this message because you are subscribed to a topic in the Google Groups "Vault" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/vault-tool/q37mKiyc5R4/unsubscribe.
To unsubscribe from this group and all its topics, send an email to vault-tool+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/vault-tool/7592fd42-daf8-41b7-b075-b803d44ce292%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
You received this message because you are subscribed to the Google Groups "Vault" group.
To unsubscribe from this group and stop receiving emails from it, send an email to vault-tool+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/vault-tool/1d2d3352-98a6-49c4-9206-a54e0d29de2e%40googlegroups.com.
Secrets engines (Vault Integrations) supporting Dynamic Secrets:
AWS (generates AWS access credentials dynamically based on IAM policies)
Consul (generates privileged Consul API tokens dynamically based on Consul ACL policies)
Cassandra (generates database credentials dynamically based on configured roles for the Cassandra database)
HANA (generates database credentials dynamically based on configured roles for the HANA database)
MongoDB (generates database credentials dynamically based on configured roles for the MongoDB database)
MSSQL (generates database credentials dynamically based on configured roles for the MSSQL database)
MySQL/MariaDB Database Secrets Engine (generates database credentials dynamically based on configured roles for the MySQL database)
PostgreSQL (generates database credentials dynamically based on configured roles for the PostgreSQL database)
Oracle (generates database credentials dynamically based on configured roles for the Oracle database)
Custom DB (generates database credentials dynamically based on configured roles for the database. Requires writing/releasing custom code)
GCP (generates Google Cloud service account keys and OAuth tokens dynamically based on IAM policies)
Nomad (generates Nomad API tokens dynamically based on pre-existing Nomad ACL policies)
PKI (generates dynamic X.509 certificates)
RabbitMQ (generates user credentials dynamically based on configured permissions and virtual hosts)
SSH (Vault used to generate SSH keys, but that’s deprecated, for good reasons. But now, using Vault's powerful CA capabilities and functionality built into OpenSSH, clients can now SSH into target hosts using their own locally generated SSH keys, which Vault signs on demand.)
SSH OTP (generates a One-Time Password every time a client wants to SSH into a remote host)
TOTP (generates time-based credentials according to the TOTP standard)