HashiCorp Certified: Vault Associate Certification

Compare Authentication Methods

Vault Identity Groups

In this guide, you’ll learn how to manage identity groups in HashiCorp Vault. Groups simplify permission management by aggregating entities and nesting subgroups. Vault supports two group types—internal and external—each tailored for different authentication and authorization workflows.

Group Basics

A Vault group collects multiple entities and can nest other groups. When you assign policies to a group, all its members inherit those policies upon login. A token’s effective policies are the union of:

  1. The entity’s auth method alias
  2. The entity’s own policies
  3. Any policies from groups (and nested groups) the entity belongs to
StepPolicy SourceExample Policy
1Auth method aliassuperuser
2Entitymanagement
3Group membershipfinance

Consider this scenario:

  • Entities and Aliases

    • Mariah (e1):
      • Entity policy: accounts-payable
      • Alias (userpass) policy: base-user
    • John Lee (e2):
      • Entity policy: management
      • Alias (userpass) policy: superuser
  • Group

    • Finance Team: policy finance, members e1 and e2

When John logs in as john.lee, his token combines superuser, management, and finance.

The image illustrates a "Vault Groups" structure, showing members with their entity IDs, policies, and aliases, highlighting how a token inherits capabilities from these elements.

Note

You can nest groups indefinitely. Policies from parent groups cascade to all nested subgroups and members.

Types of Vault Groups

Vault provides two primary group types:

Group TypeCreation MethodTypical Use Case
Internal GroupUI, CLI (vault write), APIManually defined for consistent permission sets across entities
External GroupAutomatically by auth method or manual mappingReflects groups from LDAP, OIDC, Okta, etc., without Vault-side membership management

The image explains the difference between "Internal Group" and "External Group" in Vault, highlighting their creation methods and purposes. Internal Groups are created manually to propagate identical permissions, while External Groups are inferred and created based on group associations from authentication methods.

Internal Groups and Cross-Segment Configuration

Internal groups are ideal when you centralize authentication but distribute access across Vault namespaces or segments:

  1. Enable an auth method (e.g., OIDC) at the root namespace.
  2. Map external group Team-Finance from your identity provider.
  3. Create an internal group (e.g., finance-internal) and add Team-Finance as a member.
  4. Attach segment-specific policies (like finance-read, finance-write) to the internal group.

The image is a presentation slide about Vault Groups, explaining how internal groups manage permissions and propagate them through Vault Namespaces. It includes a diagram showing the relationship between a root namespace and a child namespace.

Warning

Ensure that policy names are unique across namespaces to avoid unintended access overlaps when using internal groups with Vault Enterprise namespaces.

External Groups

External groups let Vault grant permissions based on existing groups in your identity provider. Supported methods include LDAP, Active Directory, Okta, and any OIDC-compliant system. To use:

  1. Create an external group in Vault matching the name in your IdP (e.g., Team-Finance).
  2. Attach Vault policies (for example, finance-policy) to that external group.
  3. When users authenticate, they are automatically associated with the external group and receive the mapped policies.

The image explains how external groups are used in Vault to set permissions based on group membership from identity providers like LDAP, Okta, or OIDC. It includes a diagram showing the connection between Active Directory and HashiCorp Vault.

Next Steps

Watch Video

Watch video content

Previous
Vault Entities