Vault Encryption¶
Vault manages the user credentials for the backend systems.
Replace the Pre-Installed Keys¶
Vault starts in the developers mode after the installation. For security reasons, the following configuration steps are recommended:
- 
Configure the settings for the file storage and the data transfer encryption in /opt/seal/infrastructure/config/vault.hcl:storage "file" { path = "/opt/seal/infrastructure/data/vault/" } listener "tcp" { address = "0.0.0.0:8200" tls_disable = false tls_cert_file = "/opt/seal/infrastructure/config/tls/cert.pem" tls_key_file = "/opt/seal/infrastructure/config/tls/key.pem" }
- 
As administrator, create the root token and the unseal key using the following script: - /opt/seal/infrastructure/seal-vault/secure-vault.sh
 Hint - memorize the root token and unseal key Memorize the generated root token and the unseal key. You need the unseal key whenever restarting the seal-vaultservice.
Restart the Seal-Vault Service¶
- vault operator unseal -format=json -tls-skip-verify <unsealKey>