HashiCorp Certified: Vault Associate Certification

Learning the Vault Architecture

Unsealing with Transit Auto Unseal

Vault’s Transit Auto Unseal method offloads unseal operations to a dedicated Transit Secrets Engine running in a separate Vault cluster. This approach protects the master key and enables automatic unsealing of dependent clusters on startup.

Architecture Overview

One Vault cluster (the “unsealer”) runs the Transit Secrets Engine and holds the encryption key for unsealing. Other clusters delegate their unseal operations to this central cluster:

The image illustrates the process of unsealing with Transit Auto Unseal, showing a flow from a Vault Cluster to a Master Key, then to an Encryption Key, and finally to Vault Data. It includes icons representing each component and a character illustration in the corner.

Each dependent cluster connects to the Transit cluster using the configured key. You can chain dependencies (green unseals from orange, red from green, etc.), but the core pattern remains: one cluster auto-unseals from another.

The image illustrates the concept of "Unsealing with Transit Auto Unseal," showing a central "Vault Cluster (Running Transit)" connected to multiple "Other Vault Clusters In the Organization" with arrows indicating interaction.

Key Features

The image is a slide titled "Unsealing with Transit Auto Unseal," listing features such as using a different Vault cluster's Transit Secret Engine, key rotation support, and availability in open source and Enterprise. It also mentions the need for a highly-available core Vault cluster.

FeatureDescription
Dedicated Transit EngineUses a separate Vault cluster’s Transit Secrets Engine for master key protection.
Key Rotation SupportRotate the unseal key regularly to meet compliance and security requirements.
Open Source & Enterprise ReadyAvailable in Vault OSS and Enterprise editions without additional plugins.
High Availability RequirementThe Transit cluster must be HA with a resilient backend; downtime halts auto-unseal actions.

Warning

If the central Transit cluster becomes unavailable, all dependent Vault clusters will fail to unseal. Ensure your Transit cluster is highly available and monitored.

Configuration

To enable Transit Auto Unseal, add a seal stanza to your Vault configuration file:

seal "transit" {
  address            = "https://vault.example.com:8200"
  token              = "s.Qf1s5zigZ4OX6akYjQXJC1jY"
  disable_renewal    = "false"

  # Key configuration
  key_name           = "transit_key_name"
  mount_path         = "transit/"
  namespace          = "ns1/"

  # TLS Configuration
  tls_ca_cert        = "/etc/vault/ca_cert.pem"
  tls_client_cert    = "/etc/vault/client_cert.pem"
  tls_client_key     = "/etc/vault/client_key.pem"
  tls_server_name    = "vault"
  tls_skip_verify    = "false"
}
  • address and token point to the central Vault cluster running Transit.
  • key_name, mount_path, and namespace identify which key to use.
  • TLS settings ensure secure communication between clusters.

Watch Video

Watch video content

Previous
Demo Unsealing with Auto Unseal