HashiCorp Certified: Vault Associate Certification

Compare Authentication Methods

Choosing an Auth Method

In this lesson, we’ll walk through how to select the optimal Vault authentication method for your environment. Vault supports various Auth Methods—each with unique benefits. By aligning your security requirements with Vault’s capabilities, you can ensure seamless, secure access.

Platform Versus Flexibility

You don’t have to be locked into your hosting platform’s native Auth Method. Whether you’re on Azure, AWS, or Kubernetes, you can choose any Vault Auth Method that meets your needs.

  • Azure VMs can use the Azure auth method—or AppRole, Userpass, TLS, or OIDC.
  • AWS workloads can authenticate via AWS—yet AppRole or Kubernetes Auth also work.
  • Kubernetes pods often use Kubernetes Auth but are free to switch if integration or policy demands differ.

Note

Platform-native methods simplify integration and audit trails, but you can mix and match methods to satisfy complex requirements.

Narrowing Down by Integration Characteristics

Identify keywords in your use case—such as “frequently rotated” or “existing user credentials”—to eliminate unsuitable Auth Methods quickly.

The image is a slide titled "Choosing an Auth Method," discussing key considerations for authentication methods, including frequent rotation and removing secrets from processes, with examples of what meets or does not meet the requirements.

1. Frequently Rotated

Dynamic credentials are essential when secrets must rotate often. Avoid baking static tokens into your images or CI/CD pipelines.

  • Meets requirement (dynamic):
    • AWS, Azure, GCP, Kubernetes Auth Methods
    • LDAP (with regular rotation)
  • Does not meet requirement (static):
    • Userpass
    • TLS Certificates
    • AppRole

Warning

Avoid embedding Userpass, TLS certificates, or AppRole secrets directly in images or pipelines—they are static and not automatically rotated.

2. Removing Secrets from a Process or Pipeline

When build or deployment workflows must avoid hardcoded secrets, choose platform-integrated or auto-generated methods.

  • Best choices: AWS, Azure, GCP, Kubernetes Auth Methods
  • To avoid: Userpass, TLS, AppRole

3. Using Existing User Credentials

Leverage your identity provider if you prefer human-centric logins without managing extra secrets.

  • Meets requirement (human-centric):
    • OIDC
    • LDAP
    • Okta
    • GitHub
  • Does not meet requirement (requires separate credentials):
    • Userpass
    • AWS, Azure, GCP Auth Methods

The image is a slide titled "Choosing an Auth Method," discussing the use of existing user credentials for authentication. It lists methods that meet requirements (OIDC, LDAP, Okta, GitHub) and those that do not (Userpass, AWS, Azure, GCP).


Summary Table

ScenarioRecommended Auth MethodsTo Avoid
Frequently rotatedAWS, Azure, GCP, Kubernetes, LDAP (rotated)Userpass, TLS, AppRole
Removing secrets from pipelinesAWS, Azure, GCP, KubernetesUserpass, TLS, AppRole
Existing user credentials (human)OIDC, LDAP, Okta, GitHubUserpass, AWS, Azure, GCP

By matching keywords—dynamic vs. static, integrated vs. standalone, identity provider vs. new credentials—you’ll converge on the Vault Auth Method that best fits your use case.

Watch Video

Watch video content

Previous
Vault Identity Groups