HashiCorp Developer AI
Private beta now available
Sign up today
Dismiss alert
HashiCorp Developer
HashiCorp Cloud Platform
Terraform
Packer
Consul
Vault
Boundary
Nomad
Waypoint
Vagrant
Consul
Install
Tutorials
Documentation
API
CLI
Try Cloud
(opens in new tab)
Search
Command or control key
K key
Sign in
Sign up
Theme
Consul Home
Tutorials
Tutorials
Get Started
Get Started on HCP
Get Started on Kubernetes
Get Started on VMs
Use Cases
Connect services
Control network traffic
Implement multi-tenancy
Network automation
Observe your network
Secure services
Certification Prep
Associate prep
Production
Kubernetes production patterns
Multi-cluster patterns
Operate Consul
VM production patterns
Resources
Tutorial Library
Certifications
Community Forum
(opens in new tab)
Support
(opens in new tab)
GitHub
(opens in new tab)
Developer
Consul
Tutorials
Automate security with Vault
Integrations - Vault
Integrate with Vault to enforce security best practices.
Start
7 tutorials
5min
Secrets engines
Secrets engines create, read, update, and delete secrets.
14min
Automatically Rotate Gossip Encryption Keys Secured in Vault
Use Vault's secure secrets management and consul-template to create and manage gossip key rotation for your Consul datacenter.
30min
Vault as Consul service mesh certification authority
Use Vault to automatically generate Consul service mesh certificates.
16min
Generate mTLS Certificates for Consul with Vault
Use Vault and consul-template to create and configure Vault-managed mTLS certificates for Consul's API and RPC traffic.
58min
Build your own certificate authority (CA)
Demonstrate the use of PKI secrets engine as an Intermediate-Only certificate authority which potentially allows for higher levels of security.
14min
Administer Consul access control tokens with Vault
Configure the Consul secrets engine in Vault to deliver Vault-managed Consul Access Control tokens.
22min
Vault as secrets management for Consul
Secure Consul on Kubernetes using gossip encryption, TLS certificates, and service mesh certificates using Vault as secrets management.