system

GET /sys/audit

Operation ID: auditing-list-enabled-devices

List the enabled audit devices.

Required sudo: yes

Responses

200: OK

POST /sys/audit-hash/{path}

Operation ID: auditing-calculate-hash

The hash of the given string via the given audit backend

Parameters

ParameterTypeLocationRequiredDescription
pathstringpathyesThe name of the backend. Cannot be delimited. Example: “mysql”

Request body parameters

ParameterTypeRequiredDescription
inputstringno

Responses

200: OK

ParameterTypeRequiredDescription
hashstringno

POST /sys/audit/{path}

Operation ID: auditing-enable-device

Enable a new audit device at the supplied path.

Required sudo: yes

Parameters

ParameterTypeLocationRequiredDescription
pathstringpathyesThe name of the backend. Cannot be delimited. Example: “mysql”

Request body parameters

ParameterTypeRequiredDescription
descriptionstringnoUser-friendly description for this audit backend.
localboolean (default: False)noMark the mount as a local mount, which is not replicated and is unaffected by replication.
optionsobjectnoConfiguration options for the audit backend.
typestringnoThe type of the backend. Example: “mysql”

Responses

204: OK

DELETE /sys/audit/{path}

Operation ID: auditing-disable-device

Disable the audit device at the given path.

Required sudo: yes

Parameters

ParameterTypeLocationRequiredDescription
pathstringpathyesThe name of the backend. Cannot be delimited. Example: “mysql”

Responses

204: OK

GET /sys/auth

Operation ID: auth-list-enabled-methods

List the currently enabled credential backends.

Responses

200: OK

GET /sys/auth/{path}

Operation ID: auth-read-configuration

Read the configuration of the auth engine at the given path.

Required sudo: yes

Parameters

ParameterTypeLocationRequiredDescription
pathstringpathyesThe path to mount to. Cannot be delimited. Example: “user”

Responses

200: OK

ParameterTypeRequiredDescription
accessorstringno
configobjectno
deprecation_statusstringno
descriptionstringno
external_entropy_accessbooleanno
localbooleanno
optionsobjectno
plugin_versionstringno
running_plugin_versionstringno
running_sha256stringno
seal_wrapbooleanno
typestringno
uuidstringno

POST /sys/auth/{path}

Operation ID: auth-enable-method

Enables a new auth method.

Required sudo: yes

Parameters

ParameterTypeLocationRequiredDescription
pathstringpathyesThe path to mount to. Cannot be delimited. Example: “user”

Request body parameters

ParameterTypeRequiredDescription
configobjectnoConfiguration for this mount, such as plugin_name.
descriptionstringnoUser-friendly description for this credential backend.
external_entropy_accessboolean (default: False)noWhether to give the mount access to Stronghold’s external entropy.
localboolean (default: False)noMark the mount as a local mount, which is not replicated and is unaffected by replication.
optionsobjectnoThe options to pass into the backend. Should be a json object with string keys and values.
plugin_namestringnoName of the auth plugin to use based from the name in the plugin catalog.
plugin_versionstringnoThe semantic version of the plugin to use.
seal_wrapboolean (default: False)noWhether to turn on seal wrapping for the mount.
typestringnoThe type of the backend. Example: “userpass”

Responses

204: OK

DELETE /sys/auth/{path}

Operation ID: auth-disable-method

Disable the auth method at the given auth path

Required sudo: yes

Parameters

ParameterTypeLocationRequiredDescription
pathstringpathyesThe path to mount to. Cannot be delimited. Example: “user”

Responses

204: OK

GET /sys/auth/{path}/tune

Operation ID: auth-read-tuning-information

Reads the given auth path’s configuration.

Required sudo: yes

Parameters

ParameterTypeLocationRequiredDescription
pathstringpathyesTune the configuration parameters for an auth path.

Responses

200: OK

ParameterTypeRequiredDescription
allowed_managed_keysarrayno
allowed_response_headersarrayno
audit_non_hmac_request_keysarrayno
audit_non_hmac_response_keysarrayno
default_lease_ttlintegerno
descriptionstringno
external_entropy_accessbooleanno
force_no_cachebooleanno
listing_visibilitystringno
max_lease_ttlintegerno
optionsobjectno
passthrough_request_headersarrayno
plugin_versionstringno
token_typestringno
user_lockout_counter_reset_durationintegerno
user_lockout_disablebooleanno
user_lockout_durationintegerno
user_lockout_thresholdintegerno

POST /sys/auth/{path}/tune

Operation ID: auth-tune-configuration-parameters

Tune configuration parameters for a given auth path.

Required sudo: yes

Parameters

ParameterTypeLocationRequiredDescription
pathstringpathyesTune the configuration parameters for an auth path.

Request body parameters

ParameterTypeRequiredDescription
allowed_response_headersarraynoA list of headers to whitelist and allow a plugin to set on responses.
audit_non_hmac_request_keysarraynoThe list of keys in the request data object that will not be HMAC’ed by audit devices.
audit_non_hmac_response_keysarraynoThe list of keys in the response data object that will not be HMAC’ed by audit devices.
default_lease_ttlstringnoThe default lease TTL for this mount.
descriptionstringnoUser-friendly description for this credential backend.
listing_visibilitystringnoDetermines the visibility of the mount in the UI-specific listing endpoint. Accepted value are ‘unauth’ and ‘hidden’, with the empty default (’’) behaving like ‘hidden’.
max_lease_ttlstringnoThe max lease TTL for this mount.
optionsobjectnoThe options to pass into the backend. Should be a json object with string keys and values.
passthrough_request_headersarraynoA list of headers to whitelist and pass from the request to the plugin.
plugin_versionstringnoThe semantic version of the plugin to use.
token_typestringnoThe type of token to issue (service or batch).
user_lockout_configobjectnoThe user lockout configuration to pass into the backend. Should be a json object with string keys and values.

Responses

204: OK

POST /sys/capabilities

Operation ID: query-token-capabilities

Fetches the capabilities of the given token on the given path.

Request body parameters

ParameterTypeRequiredDescription
patharrayno⚠️ Deprecated. Use ‘paths’ instead.
pathsarraynoPaths on which capabilities are being queried.
tokenstringnoToken for which capabilities are being queried.

Responses

200: OK

POST /sys/capabilities-accessor

Operation ID: query-token-accessor-capabilities

Fetches the capabilities of the token associated with the given token, on the given path.

Request body parameters

ParameterTypeRequiredDescription
accessorstringnoAccessor of the token for which capabilities are being queried.
patharrayno⚠️ Deprecated. Use ‘paths’ instead.
pathsarraynoPaths on which capabilities are being queried.

Responses

200: OK

POST /sys/capabilities-self

Operation ID: query-token-self-capabilities

Fetches the capabilities of the given token on the given path.

Request body parameters

ParameterTypeRequiredDescription
patharrayno⚠️ Deprecated. Use ‘paths’ instead.
pathsarraynoPaths on which capabilities are being queried.
tokenstringnoToken for which capabilities are being queried.

Responses

200: OK

GET /sys/config/auditing/request-headers

Operation ID: auditing-list-request-headers

List the request headers that are configured to be audited.

Required sudo: yes

Responses

200: OK

ParameterTypeRequiredDescription
headersobjectno

GET /sys/config/auditing/request-headers/{header}

Operation ID: auditing-read-request-header-information

List the information for the given request header.

Required sudo: yes

Parameters

ParameterTypeLocationRequiredDescription
headerstringpathyes

Responses

200: OK

POST /sys/config/auditing/request-headers/{header}

Operation ID: auditing-enable-request-header

Enable auditing of a header.

Required sudo: yes

Parameters

ParameterTypeLocationRequiredDescription
headerstringpathyes

Request body parameters

ParameterTypeRequiredDescription
hmacbooleanno

Responses

204: OK

DELETE /sys/config/auditing/request-headers/{header}

Operation ID: auditing-disable-request-header

Disable auditing of the given request header.

Required sudo: yes

Parameters

ParameterTypeLocationRequiredDescription
headerstringpathyes

Responses

204: OK

GET /sys/config/control-group

Operation ID: enterprise-stub-read-config-control-group

Responses

200: OK

POST /sys/config/control-group

Operation ID: enterprise-stub-write-config-control-group

Responses

200: OK

DELETE /sys/config/control-group

Operation ID: enterprise-stub-delete-config-control-group

Responses

204: empty body

GET /sys/config/cors

Operation ID: cors-read-configuration

Return the current CORS settings.

Required sudo: yes

Responses

200: OK

ParameterTypeRequiredDescription
allowed_headersarrayno
allowed_originsarrayno
enabledbooleanno

POST /sys/config/cors

Operation ID: cors-configure

Configure the CORS settings.

Required sudo: yes

Request body parameters

ParameterTypeRequiredDescription
allowed_headersarraynoA comma-separated string or array of strings indicating headers that are allowed on cross-origin requests.
allowed_originsarraynoA comma-separated string or array of strings indicating origins that may make cross-origin requests.
enablebooleannoEnables or disables CORS headers on requests.

Responses

204: OK

DELETE /sys/config/cors

Operation ID: cors-delete-configuration

Remove any CORS settings.

Required sudo: yes

Responses

204: OK

GET /sys/config/group-policy-application

Operation ID: enterprise-stub-read-config-group-policy-application

Responses

200: OK

POST /sys/config/group-policy-application

Operation ID: enterprise-stub-write-config-group-policy-application

Responses

200: OK

POST /sys/config/reload/{subsystem}

Operation ID: reload-subsystem

Reload the given subsystem

Parameters

ParameterTypeLocationRequiredDescription
subsystemstringpathyes

Responses

204: OK

GET /sys/config/state/sanitized

Operation ID: read-sanitized-configuration-state

Return a sanitized version of the Stronghold server configuration.

Responses

200: OK

GET /sys/config/ui/headers

Operation ID: ui-headers-list

Return a list of configured UI headers.

Parameters

ParameterTypeLocationRequiredDescription
liststring (true)queryyesMust be set to true

Responses

200:

ParameterTypeRequiredDescription
keysarraynoLists of configured UI headers. Omitted if list is empty

GET /sys/config/ui/headers/{header}

Operation ID: ui-headers-read-configuration

Return the given UI header’s configuration

Required sudo: yes

Parameters

ParameterTypeLocationRequiredDescription
headerstringpathyesThe name of the header.

Responses

200: OK

ParameterTypeRequiredDescription
valuestringnoreturns the first header value when multivalue request parameter is false
valuesarraynoreturns all header values when multivalue request parameter is true

POST /sys/config/ui/headers/{header}

Operation ID: ui-headers-configure

Configure the values to be returned for the UI header.

Required sudo: yes

Parameters

ParameterTypeLocationRequiredDescription
headerstringpathyesThe name of the header.

Request body parameters

ParameterTypeRequiredDescription
multivaluebooleannoReturns multiple values if true
valuesarraynoThe values to set the header.

Responses

200: OK

DELETE /sys/config/ui/headers/{header}

Operation ID: ui-headers-delete-configuration

Remove a UI header.

Required sudo: yes

Parameters

ParameterTypeLocationRequiredDescription
headerstringpathyesThe name of the header.

Responses

204: OK

POST /sys/control-group/authorize

Operation ID: enterprise-stub-write-control-group-authorize

Responses

200: OK

POST /sys/control-group/request

Operation ID: enterprise-stub-write-control-group-request

Responses

200: OK

POST /sys/decode-token

Operation ID: decode

Decodes the encoded token with the otp.

Available without authentication: yes

Request body parameters

ParameterTypeRequiredDescription
encoded_tokenstringnoSpecifies the encoded token (result from generate-root).
otpstringnoSpecifies the otp code for decode.

Responses

200: OK

GET /sys/experiments

Operation ID: list-experimental-features

Returns the available and enabled experiments

Responses

200: OK

GET /sys/generate-root

Operation ID: root-token-generation-read-progress2

Read the configuration and progress of the current root generation attempt.

Responses

200: OK

ParameterTypeRequiredDescription
completebooleanno
encoded_root_tokenstringno
encoded_tokenstringno
noncestringno
otpstringno
otp_lengthintegerno
pgp_fingerprintstringno
progressintegerno
requiredintegerno
startedbooleanno

POST /sys/generate-root

Operation ID: root-token-generation-initialize-2

Initializes a new root generation attempt.

Request body parameters

ParameterTypeRequiredDescription
pgp_keystringnoSpecifies a base64-encoded PGP public key.

Responses

200: OK

ParameterTypeRequiredDescription
completebooleanno
encoded_root_tokenstringno
encoded_tokenstringno
noncestringno
otpstringno
otp_lengthintegerno
pgp_fingerprintstringno
progressintegerno
requiredintegerno
startedbooleanno

DELETE /sys/generate-root

Operation ID: root-token-generation-cancel-2

Cancels any in-progress root generation attempt.

Responses

204: OK

GET /sys/generate-root/attempt

Operation ID: root-token-generation-read-progress

Read the configuration and progress of the current root generation attempt.

Available without authentication: yes

Responses

200: OK

ParameterTypeRequiredDescription
completebooleanno
encoded_root_tokenstringno
encoded_tokenstringno
noncestringno
otpstringno
otp_lengthintegerno
pgp_fingerprintstringno
progressintegerno
requiredintegerno
startedbooleanno

POST /sys/generate-root/attempt

Operation ID: root-token-generation-initialize

Initializes a new root generation attempt.

Available without authentication: yes

Request body parameters

ParameterTypeRequiredDescription
pgp_keystringnoSpecifies a base64-encoded PGP public key.

Responses

200: OK

ParameterTypeRequiredDescription
completebooleanno
encoded_root_tokenstringno
encoded_tokenstringno
noncestringno
otpstringno
otp_lengthintegerno
pgp_fingerprintstringno
progressintegerno
requiredintegerno
startedbooleanno

DELETE /sys/generate-root/attempt

Operation ID: root-token-generation-cancel

Cancels any in-progress root generation attempt.

Available without authentication: yes

Responses

204: OK

POST /sys/generate-root/update

Operation ID: root-token-generation-update

Enter a single unseal key share to progress the root generation attempt.

Available without authentication: yes

Request body parameters

ParameterTypeRequiredDescription
keystringnoSpecifies a single unseal key share.
noncestringnoSpecifies the nonce of the attempt.

Responses

200: OK

ParameterTypeRequiredDescription
completebooleanno
encoded_root_tokenstringno
encoded_tokenstringno
noncestringno
otpstringno
otp_lengthintegerno
pgp_fingerprintstringno
progressintegerno
requiredintegerno
startedbooleanno

GET /sys/ha-status

Operation ID: ha-status

Check the HA status of a Stronghold cluster

Responses

200: OK

ParameterTypeRequiredDescription
nodesarrayno

GET /sys/health

Operation ID: read-health-status

Returns the health status of Stronghold.

Available without authentication: yes

Responses

200: initialized, unsealed, and active

429: unsealed and standby

472: data recovery mode replication secondary and active

501: not initialized

503: sealed

GET /sys/host-info

Operation ID: collect-host-information

Information about the host instance that this Stronghold server is running on.

Responses

200: OK

ParameterTypeRequiredDescription
cpuarrayno
cpu_timesarrayno
diskarrayno
hostobjectno
memoryobjectno
timestampstringno

GET /sys/in-flight-req

Operation ID: collect-in-flight-request-information

reports in-flight requests

Responses

200: OK

GET /sys/init

Operation ID: read-initialization-status

Returns the initialization status of Stronghold.

Available without authentication: yes

Responses

200: OK

POST /sys/init

Operation ID: initialize

Initialize a new Stronghold.

Available without authentication: yes

Request body parameters

ParameterTypeRequiredDescription
pgp_keysarraynoSpecifies an array of PGP public keys used to encrypt the output unseal keys. Ordering is preserved. The keys must be base64-encoded from their original binary representation. The size of this array must be the same as secret_shares.
recovery_pgp_keysarraynoSpecifies an array of PGP public keys used to encrypt the output recovery keys. Ordering is preserved. The keys must be base64-encoded from their original binary representation. The size of this array must be the same as recovery_shares.
recovery_sharesintegernoSpecifies the number of shares to split the recovery key into.
recovery_thresholdintegernoSpecifies the number of shares required to reconstruct the recovery key. This must be less than or equal to recovery_shares.
root_token_pgp_keystringnoSpecifies a PGP public key used to encrypt the initial root token. The key must be base64-encoded from its original binary representation.
secret_sharesintegernoSpecifies the number of shares to split the unseal key into.
secret_thresholdintegernoSpecifies the number of shares required to reconstruct the unseal key. This must be less than or equal secret_shares. If using Stronghold HSM with auto-unsealing, this value must be the same as secret_shares.
stored_sharesintegernoSpecifies the number of shares that should be encrypted by the HSM and stored for auto-unsealing. Currently must be the same as secret_shares.

Responses

200: OK

GET /sys/internal/counters/activity

Operation ID: internal-client-activity-report-counts

Report the client count metrics, for this namespace and all child namespaces.

Responses

200: OK

GET /sys/internal/counters/activity/export

Operation ID: internal-client-activity-export

Report the client count metrics, for this namespace and all child namespaces.

Responses

200: OK

GET /sys/internal/counters/activity/monthly

Operation ID: internal-client-activity-report-counts-this-month

Report the number of clients for this month, for this namespace and all child namespaces.

Responses

200: OK

GET /sys/internal/counters/config

Operation ID: internal-client-activity-read-configuration

Read the client count tracking configuration.

Responses

200: OK

POST /sys/internal/counters/config

Operation ID: internal-client-activity-configure

Enable or disable collection of client count, set retention period, or set default reporting period.

Request body parameters

ParameterTypeRequiredDescription
default_report_monthsinteger (default: 12)noNumber of months to report if no start date specified.
enabledstring (default: default)noEnable or disable collection of client count: enable, disable, or default.
retention_monthsinteger (default: 24)noNumber of months of client data to retain. Setting to 0 will clear all existing data.

Responses

200: OK

GET /sys/internal/counters/entities

Operation ID: internal-count-entities

Backwards compatibility is not guaranteed for this API

Responses

200: OK

ParameterTypeRequiredDescription
countersobjectno

GET /sys/internal/counters/requests

Operation ID: internal-count-requests

Backwards compatibility is not guaranteed for this API

Responses

200: OK

GET /sys/internal/counters/tokens

Operation ID: internal-count-tokens

Backwards compatibility is not guaranteed for this API

Responses

200: OK

ParameterTypeRequiredDescription
countersobjectno

GET /sys/internal/inspect/router/{tag}

Operation ID: internal-inspect-router

Expose the route entry and mount entry tables present in the router

Required sudo: yes

Parameters

ParameterTypeLocationRequiredDescription
tagstringpathyesName of subtree being observed

Responses

200: OK

GET /sys/internal/specs/openapi

Operation ID: internal-generate-open-api-document

Generate an OpenAPI 3 document of all mounted paths.

Available without authentication: yes

Parameters

ParameterTypeLocationRequiredDescription
generic_mount_pathsbooleanquerynoUse generic mount paths

Responses

200: OK

POST /sys/internal/specs/openapi

Operation ID: internal-generate-open-api-document-with-parameters

Generate an OpenAPI 3 document of all mounted paths.

Available without authentication: yes

Parameters

ParameterTypeLocationRequiredDescription
generic_mount_pathsbooleanquerynoUse generic mount paths

Request body parameters

ParameterTypeRequiredDescription
contextstringnoContext string appended to every operationId

Responses

200: OK

GET /sys/internal/ui/feature-flags

Operation ID: internal-ui-list-enabled-feature-flags

Lists enabled feature flags.

Responses

200: OK

ParameterTypeRequiredDescription
feature_flagsarrayno

GET /sys/internal/ui/mounts

Operation ID: internal-ui-list-enabled-visible-mounts

Lists all enabled and visible auth and secrets mounts.

Available without authentication: yes

Responses

200: OK

ParameterTypeRequiredDescription
authobjectnoauth mounts
secretobjectnosecret mounts

GET /sys/internal/ui/mounts/{path}

Operation ID: internal-ui-read-mount-information

Return information about the given mount.

Available without authentication: yes

Parameters

ParameterTypeLocationRequiredDescription
pathstringpathyesThe path of the mount.

Responses

200: OK

ParameterTypeRequiredDescription
accessorstringno
configobjectno
descriptionstringno
external_entropy_accessbooleanno
localbooleanno
optionsobjectno
pathstringno
plugin_versionstringno
running_plugin_versionstringno
running_sha256stringno
seal_wrapbooleanno
typestringno
uuidstringno

GET /sys/internal/ui/namespaces

Operation ID: internal-ui-list-namespaces

Backwards compatibility is not guaranteed for this API

Available without authentication: yes

Responses

200: OK

ParameterTypeRequiredDescription
keysarraynofield is only returned if there are one or more namespaces

GET /sys/internal/ui/resultant-acl

Operation ID: internal-ui-read-resultant-acl

Backwards compatibility is not guaranteed for this API

Responses

200: OK

ParameterTypeRequiredDescription
exact_pathsobjectno
glob_pathsobjectno
rootbooleanno

204: empty response returned if no client token

GET /sys/key-status

Operation ID: encryption-key-status

Provides information about the backend encryption key.

Responses

200: OK

GET /sys/leader

Operation ID: leader-status

Returns the high availability status and current leader instance of Stronghold.

Available without authentication: yes

Responses

200: OK

ParameterTypeRequiredDescription
active_timestringno
ha_enabledbooleanno
is_selfbooleanno
last_walintegerno
leader_addressstringno
leader_cluster_addressstringno
performance_standbybooleanno
performance_standby_last_remote_walintegerno
raft_applied_indexintegerno
raft_committed_indexintegerno

GET /sys/leases

Operation ID: leases-list

List leases associated with this Stronghold cluster

Required sudo: yes

Responses

200: OK

ParameterTypeRequiredDescription
countsintegernoNumber of matching leases per mount
lease_countintegernoNumber of matching leases

GET /sys/leases/count

Operation ID: leases-count

Count of leases associated with this Stronghold cluster

Responses

200: OK

ParameterTypeRequiredDescription
countsintegernoNumber of matching leases per mount
lease_countintegernoNumber of matching leases

POST /sys/leases/lookup

Operation ID: leases-read-lease

View or list lease metadata.

Request body parameters

ParameterTypeRequiredDescription
lease_idstringnoThe lease identifier to renew. This is included with a lease.

Responses

200: OK

ParameterTypeRequiredDescription
expire_timestringnoOptional lease expiry time
idstringnoLease id
issue_timestringnoTimestamp for the lease’s issue time
last_renewalstringnoOptional Timestamp of the last time the lease was renewed
renewablebooleannoTrue if the lease is able to be renewed
ttlintegernoTime to Live set for the lease, returns 0 if unset

GET /sys/leases/lookup/

Operation ID: leases-look-up

View or list lease metadata.

Required sudo: yes

Parameters

ParameterTypeLocationRequiredDescription
liststring (true)queryyesMust be set to true

Responses

200: OK

ParameterTypeRequiredDescription
keysarraynoA list of lease ids

GET /sys/leases/lookup/{prefix}

Operation ID: leases-look-up-with-prefix

View or list lease metadata.

Required sudo: yes

Parameters

ParameterTypeLocationRequiredDescription
prefixstringpathyesThe path to list leases under. Example: “aws/creds/deploy”
liststring (true)queryyesMust be set to true

Responses

200: OK

ParameterTypeRequiredDescription
keysarraynoA list of lease ids

POST /sys/leases/renew

Operation ID: leases-renew-lease

Renews a lease, requesting to extend the lease.

Request body parameters

ParameterTypeRequiredDescription
incrementintegernoThe desired increment in seconds to the lease
lease_idstringnoThe lease identifier to renew. This is included with a lease.
url_lease_idstringnoThe lease identifier to renew. This is included with a lease.

Responses

204: OK

POST /sys/leases/renew/{url_lease_id}

Operation ID: leases-renew-lease-with-id

Renews a lease, requesting to extend the lease.

Parameters

ParameterTypeLocationRequiredDescription
url_lease_idstringpathyesThe lease identifier to renew. This is included with a lease.

Request body parameters

ParameterTypeRequiredDescription
incrementintegernoThe desired increment in seconds to the lease
lease_idstringnoThe lease identifier to renew. This is included with a lease.

Responses

204: OK

POST /sys/leases/revoke

Operation ID: leases-revoke-lease

Revokes a lease immediately.

Request body parameters

ParameterTypeRequiredDescription
lease_idstringnoThe lease identifier to renew. This is included with a lease.
syncboolean (default: True)noWhether or not to perform the revocation synchronously
url_lease_idstringnoThe lease identifier to renew. This is included with a lease.

Responses

204: OK

POST /sys/leases/revoke-force/{prefix}

Operation ID: leases-force-revoke-lease-with-prefix

Revokes all secrets or tokens generated under a given prefix immediately

Required sudo: yes

Parameters

ParameterTypeLocationRequiredDescription
prefixstringpathyesThe path to revoke keys under. Example: “prod/aws/ops”

Responses

204: OK

POST /sys/leases/revoke-prefix/{prefix}

Operation ID: leases-revoke-lease-with-prefix

Revokes all secrets (via a lease ID prefix) or tokens (via the tokens’ path property) generated under a given prefix immediately.

Required sudo: yes

Parameters

ParameterTypeLocationRequiredDescription
prefixstringpathyesThe path to revoke keys under. Example: “prod/aws/ops”

Request body parameters

ParameterTypeRequiredDescription
syncboolean (default: True)noWhether or not to perform the revocation synchronously

Responses

204: OK

POST /sys/leases/revoke/{url_lease_id}

Operation ID: leases-revoke-lease-with-id

Revokes a lease immediately.

Parameters

ParameterTypeLocationRequiredDescription
url_lease_idstringpathyesThe lease identifier to renew. This is included with a lease.

Request body parameters

ParameterTypeRequiredDescription
lease_idstringnoThe lease identifier to renew. This is included with a lease.
syncboolean (default: True)noWhether or not to perform the revocation synchronously

Responses

204: OK

POST /sys/leases/tidy

Operation ID: leases-tidy

This endpoint performs cleanup tasks that can be run if certain error conditions have occurred.

Responses

204: OK

GET /sys/locked-users

Operation ID: locked-users-list

Report the locked user count metrics, for this namespace and all child namespaces.

Responses

200: OK

POST /sys/locked-users/{mount_accessor}/unlock/{alias_identifier}

Operation ID: locked-users-unlock

Unlocks the user with given mount_accessor and alias_identifier

Parameters

ParameterTypeLocationRequiredDescription
alias_identifierstringpathyesIt is the name of the alias (user). For example, if the alias belongs to userpass backend, the name should be a valid username within userpass auth method. If the alias belongs to an approle auth method, the name should be a valid RoleID
mount_accessorstringpathyesMountAccessor is the identifier of the mount entry to which the user belongs

Responses

200: OK

GET /sys/loggers

Operation ID: loggers-read-verbosity-level

Read the log level for all existing loggers.

Responses

200: OK

POST /sys/loggers

Operation ID: loggers-update-verbosity-level

Modify the log level for all existing loggers.

Request body parameters

ParameterTypeRequiredDescription
levelstringnoLog verbosity level. Supported values (in order of detail) are “trace”, “debug”, “info”, “warn”, and “error”.

Responses

204: OK

DELETE /sys/loggers

Operation ID: loggers-revert-verbosity-level

Revert the all loggers to use log level provided in config.

Responses

204: OK

GET /sys/loggers/{name}

Operation ID: loggers-read-verbosity-level-for

Read the log level for a single logger.

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyesThe name of the logger to be modified.

Responses

200: OK

POST /sys/loggers/{name}

Operation ID: loggers-update-verbosity-level-for

Modify the log level of a single logger.

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyesThe name of the logger to be modified.

Request body parameters

ParameterTypeRequiredDescription
levelstringnoLog verbosity level. Supported values (in order of detail) are “trace”, “debug”, “info”, “warn”, and “error”.

Responses

204: OK

DELETE /sys/loggers/{name}

Operation ID: loggers-revert-verbosity-level-for

Revert a single logger to use log level provided in config.

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyesThe name of the logger to be modified.

Responses

204: OK

GET /sys/managed-keys/{type}

Operation ID: enterprise-stub-list-managed-keys-type

Parameters

ParameterTypeLocationRequiredDescription
typestringpathyes
liststring (true)queryyesMust be set to true

Responses

200: OK

GET /sys/managed-keys/{type}/{name}

Operation ID: enterprise-stub-read-managed-keys-type-name

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyes
typestringpathyes

Responses

200: OK

POST /sys/managed-keys/{type}/{name}

Operation ID: enterprise-stub-write-managed-keys-type-name

Creation supported: yes

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyes
typestringpathyes

Responses

200: OK

DELETE /sys/managed-keys/{type}/{name}

Operation ID: enterprise-stub-delete-managed-keys-type-name

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyes
typestringpathyes

Responses

204: empty body

POST /sys/managed-keys/{type}/{name}/test/sign

Operation ID: enterprise-stub-write-managed-keys-type-name-test-sign

Creation supported: yes

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyes
typestringpathyes

Responses

200: OK

GET /sys/metrics

Operation ID: metrics

Export the metrics aggregated for telemetry purpose.

Parameters

ParameterTypeLocationRequiredDescription
formatstringquerynoFormat to export metrics into. Currently accepts only “prometheus”.

Responses

200: OK

POST /sys/mfa/validate

Operation ID: mfa-validate

Validates the login for the given MFA methods. Upon successful validation, it returns an auth response containing the client token

Available without authentication: yes

Request body parameters

ParameterTypeRequiredDescription
mfa_payloadobjectyesA map from MFA method ID to a slice of passcodes or an empty slice if the method does not use passcodes
mfa_request_idstringyesID for this MFA request

Responses

200: OK

GET /sys/monitor

Operation ID: monitor

Parameters

ParameterTypeLocationRequiredDescription
log_formatstringquerynoOutput format of logs. Supported values are “standard” and “json”. The default is “standard”.
log_levelstringquerynoLog level to view system logs at. Currently supported values are “trace”, “debug”, “info”, “warn”, “error”.

Responses

200: OK

GET /sys/mounts

Operation ID: mounts-list-secrets-engines

List the currently mounted backends.

Responses

200: OK

GET /sys/mounts/{path}

Operation ID: mounts-read-configuration

Read the configuration of the secret engine at the given path.

Parameters

ParameterTypeLocationRequiredDescription
pathstringpathyesThe path to mount to. Example: “aws/east”

Responses

200: OK

ParameterTypeRequiredDescription
accessorstringno
configobjectnoConfiguration for this mount, such as default_lease_ttl and max_lease_ttl.
deprecation_statusstringno
descriptionstringnoUser-friendly description for this mount.
external_entropy_accessbooleanno
localboolean (default: False)noMark the mount as a local mount, which is not replicated and is unaffected by replication.
optionsobjectnoThe options to pass into the backend. Should be a json object with string keys and values.
plugin_versionstringnoThe semantic version of the plugin to use.
running_plugin_versionstringno
running_sha256stringno
seal_wrapboolean (default: False)noWhether to turn on seal wrapping for the mount.
typestringnoThe type of the backend. Example: “passthrough”
uuidstringno

POST /sys/mounts/{path}

Operation ID: mounts-enable-secrets-engine

Enable a new secrets engine at the given path.

Parameters

ParameterTypeLocationRequiredDescription
pathstringpathyesThe path to mount to. Example: “aws/east”

Request body parameters

ParameterTypeRequiredDescription
configobjectnoConfiguration for this mount, such as default_lease_ttl and max_lease_ttl.
descriptionstringnoUser-friendly description for this mount.
external_entropy_accessboolean (default: False)noWhether to give the mount access to Stronghold’s external entropy.
localboolean (default: False)noMark the mount as a local mount, which is not replicated and is unaffected by replication.
optionsobjectnoThe options to pass into the backend. Should be a json object with string keys and values.
plugin_namestringnoName of the plugin to mount based from the name registered in the plugin catalog.
plugin_versionstringnoThe semantic version of the plugin to use.
seal_wrapboolean (default: False)noWhether to turn on seal wrapping for the mount.
typestringnoThe type of the backend. Example: “passthrough”

Responses

204: OK

DELETE /sys/mounts/{path}

Operation ID: mounts-disable-secrets-engine

Disable the mount point specified at the given path.

Parameters

ParameterTypeLocationRequiredDescription
pathstringpathyesThe path to mount to. Example: “aws/east”

Responses

200: OK

GET /sys/mounts/{path}/tune

Operation ID: mounts-read-tuning-information

Tune backend configuration parameters for this mount.

Parameters

ParameterTypeLocationRequiredDescription
pathstringpathyesThe path to mount to. Example: “aws/east”

Responses

200: OK

ParameterTypeRequiredDescription
allowed_managed_keysarrayno
allowed_response_headersarraynoA list of headers to whitelist and allow a plugin to set on responses.
audit_non_hmac_request_keysarrayno
audit_non_hmac_response_keysarrayno
default_lease_ttlintegernoThe default lease TTL for this mount.
descriptionstringnoUser-friendly description for this credential backend.
external_entropy_accessbooleanno
force_no_cachebooleanno
listing_visibilitystringno
max_lease_ttlintegernoThe max lease TTL for this mount.
optionsobjectnoThe options to pass into the backend. Should be a json object with string keys and values.
passthrough_request_headersarrayno
plugin_versionstringnoThe semantic version of the plugin to use.
token_typestringnoThe type of token to issue (service or batch).
user_lockout_counter_reset_durationintegerno
user_lockout_disablebooleanno
user_lockout_durationintegerno
user_lockout_thresholdintegerno

POST /sys/mounts/{path}/tune

Operation ID: mounts-tune-configuration-parameters

Tune backend configuration parameters for this mount.

Parameters

ParameterTypeLocationRequiredDescription
pathstringpathyesThe path to mount to. Example: “aws/east”

Request body parameters

ParameterTypeRequiredDescription
allowed_managed_keysarrayno
allowed_response_headersarraynoA list of headers to whitelist and allow a plugin to set on responses.
audit_non_hmac_request_keysarraynoThe list of keys in the request data object that will not be HMAC’ed by audit devices.
audit_non_hmac_response_keysarraynoThe list of keys in the response data object that will not be HMAC’ed by audit devices.
cmd_enable_replbooleannoEnable the replication for this mount
default_lease_ttlstringnoThe default lease TTL for this mount.
descriptionstringnoUser-friendly description for this credential backend.
listing_visibilitystringnoDetermines the visibility of the mount in the UI-specific listing endpoint. Accepted value are ‘unauth’ and ‘hidden’, with the empty default (’’) behaving like ‘hidden’.
max_lease_ttlstringnoThe max lease TTL for this mount.
optionsobjectnoThe options to pass into the backend. Should be a json object with string keys and values.
passthrough_request_headersarraynoA list of headers to whitelist and pass from the request to the plugin.
plugin_versionstringnoThe semantic version of the plugin to use.
src_ca_certstringno
src_secret_patharrayno
src_tokenstringno
sync_period_minintegerno
token_typestringnoThe type of token to issue (service or batch).
user_lockout_configobjectnoThe user lockout configuration to pass into the backend. Should be a json object with string keys and values.

Responses

200: OK

GET /sys/namespaces/

Operation ID: namespaces-list-namespaces

Create a new namespace at a new path.

Parameters

ParameterTypeLocationRequiredDescription
liststring (true)queryyesMust be set to true

Responses

200: OK

POST /sys/namespaces/api-lock/lock

Operation ID: namespaces-lock-namespace-api

Lock the API for a namespace and all its descendants.

Request body parameters

ParameterTypeRequiredDescription
pathstringnoOptional child namespace path to lock. If not provided, locks the current namespace.

Responses

200: OK

POST /sys/namespaces/api-lock/lock/{path}

Operation ID: namespaces-lock-namespaces-api-lock-lock-path

Lock the API for a namespace and all its descendants.

Parameters

ParameterTypeLocationRequiredDescription
pathstringpathyesOptional child namespace path to lock. If not provided, locks the current namespace.

Responses

200: OK

POST /sys/namespaces/api-lock/unlock

Operation ID: namespaces-unlock-namespace-api

Unlock the API for a namespace and all its descendants.

Request body parameters

ParameterTypeRequiredDescription
pathstringnoOptional child namespace path to unlock. If not provided, unlocks the current namespace.
unlock_keystringnoThe unlock key returned when the namespace was locked. Required unless using a root token.

Responses

200: OK

POST /sys/namespaces/api-lock/unlock/{path}

Operation ID: namespaces-unlock-namespaces-api-lock-unlock-path

Unlock the API for a namespace and all its descendants.

Parameters

ParameterTypeLocationRequiredDescription
pathstringpathyesOptional child namespace path to unlock. If not provided, unlocks the current namespace.

Request body parameters

ParameterTypeRequiredDescription
unlock_keystringnoThe unlock key returned when the namespace was locked. Required unless using a root token.

Responses

200: OK

GET /sys/namespaces/{path}

Operation ID: namespaces-read-namespace

Read namespace info

Parameters

ParameterTypeLocationRequiredDescription
pathstringpathyesPath of the namespace.

Responses

200: OK

POST /sys/namespaces/{path}

Operation ID: namespaces-create-namespace

Create a new namespace at the given path.

Parameters

ParameterTypeLocationRequiredDescription
pathstringpathyesPath of the namespace.

Request body parameters

ParameterTypeRequiredDescription
custom_metadataobjectnoUser-provided key-value pairs that are used to describe information about a secret.

Responses

204: OK

DELETE /sys/namespaces/{path}

Operation ID: namespaces-delete-namespace

Delete namespace specified at the given path.

Parameters

ParameterTypeLocationRequiredDescription
pathstringpathyesPath of the namespace.

Responses

200: OK

GET /sys/plugins/catalog

Operation ID: plugins-catalog-list-plugins

Lists all the plugins known to Stronghold

Responses

200: OK

ParameterTypeRequiredDescription
detailedobjectno

GET /sys/plugins/catalog/{name}

Operation ID: plugins-catalog-read-plugin-configuration

Return the configuration data for the plugin with the given name.

Required sudo: yes

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyesThe name of the plugin

Responses

200: OK

ParameterTypeRequiredDescription
argsarraynoThe args passed to plugin command.
builtinbooleanno
commandstringnoThe command used to start the plugin. The executable defined in this command must exist in stronghold’s plugin directory.
deprecation_statusstringno
namestringnoThe name of the plugin
sha256stringnoThe SHA256 sum of the executable used in the command field. This should be HEX encoded.
versionstringnoThe semantic version of the plugin to use.

POST /sys/plugins/catalog/{name}

Operation ID: plugins-catalog-register-plugin

Register a new plugin, or updates an existing one with the supplied name.

Required sudo: yes

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyesThe name of the plugin

Request body parameters

ParameterTypeRequiredDescription
argsarraynoThe args passed to plugin command.
commandstringnoThe command used to start the plugin. The executable defined in this command must exist in stronghold’s plugin directory.
envarraynoThe environment variables passed to plugin command. Each entry is of the form “key=value”.
sha256stringnoThe SHA256 sum of the executable used in the command field. This should be HEX encoded.
typestringnoThe type of the plugin, may be auth, secret, or database
versionstringnoThe semantic version of the plugin to use.

Responses

200: OK

DELETE /sys/plugins/catalog/{name}

Operation ID: plugins-catalog-remove-plugin

Remove the plugin with the given name.

Required sudo: yes

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyesThe name of the plugin

Responses

200: OK

GET /sys/plugins/catalog/{type}

Operation ID: plugins-catalog-list-plugins-with-type

List the plugins in the catalog.

Required sudo: yes

Parameters

ParameterTypeLocationRequiredDescription
typestringpathyesThe type of the plugin, may be auth, secret, or database
liststring (true)queryyesMust be set to true

Responses

200: OK

ParameterTypeRequiredDescription
keysarraynoList of plugin names in the catalog

GET /sys/plugins/catalog/{type}/{name}

Operation ID: plugins-catalog-read-plugin-configuration-with-type

Return the configuration data for the plugin with the given name.

Required sudo: yes

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyesThe name of the plugin
typestringpathyesThe type of the plugin, may be auth, secret, or database

Responses

200: OK

ParameterTypeRequiredDescription
argsarraynoThe args passed to plugin command.
builtinbooleanno
commandstringnoThe command used to start the plugin. The executable defined in this command must exist in stronghold’s plugin directory.
deprecation_statusstringno
namestringnoThe name of the plugin
sha256stringnoThe SHA256 sum of the executable used in the command field. This should be HEX encoded.
versionstringnoThe semantic version of the plugin to use.

POST /sys/plugins/catalog/{type}/{name}

Operation ID: plugins-catalog-register-plugin-with-type

Register a new plugin, or updates an existing one with the supplied name.

Required sudo: yes

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyesThe name of the plugin
typestringpathyesThe type of the plugin, may be auth, secret, or database

Request body parameters

ParameterTypeRequiredDescription
argsarraynoThe args passed to plugin command.
commandstringnoThe command used to start the plugin. The executable defined in this command must exist in stronghold’s plugin directory.
envarraynoThe environment variables passed to plugin command. Each entry is of the form “key=value”.
sha256stringnoThe SHA256 sum of the executable used in the command field. This should be HEX encoded.
versionstringnoThe semantic version of the plugin to use.

Responses

200: OK

DELETE /sys/plugins/catalog/{type}/{name}

Operation ID: plugins-catalog-remove-plugin-with-type

Remove the plugin with the given name.

Required sudo: yes

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyesThe name of the plugin
typestringpathyesThe type of the plugin, may be auth, secret, or database

Responses

200: OK

POST /sys/plugins/reload/backend

Operation ID: plugins-reload-backends

Reload mounted plugin backends.

Request body parameters

ParameterTypeRequiredDescription
mountsarraynoThe mount paths of the plugin backends to reload.
pluginstringnoThe name of the plugin to reload, as registered in the plugin catalog.
scopestringno

Responses

200: OK

ParameterTypeRequiredDescription
reload_idstringno

202: OK

ParameterTypeRequiredDescription
reload_idstringno

GET /sys/plugins/reload/backend/status

Operation ID: enterprise-stub-read-plugins-reload-backend-status

Responses

200: OK

GET /sys/policies/acl

Operation ID: policies-list-acl-policies

List the configured access control policies.

Parameters

ParameterTypeLocationRequiredDescription
liststring (true)queryyesMust be set to true

Responses

200: OK

ParameterTypeRequiredDescription
keysarrayno
policiesarrayno

GET /sys/policies/acl/{name}

Operation ID: policies-read-acl-policy

Retrieve information about the named ACL policy.

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyesThe name of the policy. Example: “ops”

Responses

200: OK

ParameterTypeRequiredDescription
namestringno
policystringno
rulesstringno

POST /sys/policies/acl/{name}

Operation ID: policies-write-acl-policy

Add a new or update an existing ACL policy.

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyesThe name of the policy. Example: “ops”

Request body parameters

ParameterTypeRequiredDescription
policystringnoThe rules of the policy.

Responses

204: OK

DELETE /sys/policies/acl/{name}

Operation ID: policies-delete-acl-policy

Delete the ACL policy with the given name.

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyesThe name of the policy. Example: “ops”

Responses

204: OK

GET /sys/policies/egp

Operation ID: enterprise-stub-list-policies-egp

Parameters

ParameterTypeLocationRequiredDescription
liststring (true)queryyesMust be set to true

Responses

200: OK

GET /sys/policies/egp/{name}

Operation ID: enterprise-stub-read-policies-egp-name

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyes

Responses

200: OK

POST /sys/policies/egp/{name}

Operation ID: enterprise-stub-write-policies-egp-name

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyes

Responses

200: OK

DELETE /sys/policies/egp/{name}

Operation ID: enterprise-stub-delete-policies-egp-name

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyes

Responses

204: empty body

GET /sys/policies/password

Operation ID: policies-list-password-policies

List the existing password policies.

Parameters

ParameterTypeLocationRequiredDescription
liststring (true)queryyesMust be set to true

Responses

200: OK

ParameterTypeRequiredDescription
keysarrayno

GET /sys/policies/password/{name}

Operation ID: policies-read-password-policy

Retrieve an existing password policy.

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyesThe name of the password policy.

Responses

204: OK

ParameterTypeRequiredDescription
policystringno

POST /sys/policies/password/{name}

Operation ID: policies-write-password-policy

Add a new or update an existing password policy.

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyesThe name of the password policy.

Request body parameters

ParameterTypeRequiredDescription
policystringnoThe password policy

Responses

204: OK

DELETE /sys/policies/password/{name}

Operation ID: policies-delete-password-policy

Delete a password policy.

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyesThe name of the password policy.

Responses

204: OK

GET /sys/policies/password/{name}/generate

Operation ID: policies-generate-password-from-password-policy

Generate a password from an existing password policy.

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyesThe name of the password policy.

Responses

200: OK

ParameterTypeRequiredDescription
passwordstringno

GET /sys/policies/rgp

Operation ID: enterprise-stub-list-policies-rgp

Parameters

ParameterTypeLocationRequiredDescription
liststring (true)queryyesMust be set to true

Responses

200: OK

GET /sys/policies/rgp/{name}

Operation ID: enterprise-stub-read-policies-rgp-name

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyes

Responses

200: OK

POST /sys/policies/rgp/{name}

Operation ID: enterprise-stub-write-policies-rgp-name

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyes

Responses

200: OK

DELETE /sys/policies/rgp/{name}

Operation ID: enterprise-stub-delete-policies-rgp-name

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyes

Responses

204: empty body

GET /sys/policy

Operation ID: policies-list

List the configured access control policies.

Parameters

ParameterTypeLocationRequiredDescription
liststringquerynoReturn a list if true

Responses

200: OK

ParameterTypeRequiredDescription
keysarrayno
policiesarrayno

GET /sys/policy/{name}

Operation ID: policies-read-acl-policy2

Retrieve the policy body for the named policy.

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyesThe name of the policy. Example: “ops”

Responses

200: OK

ParameterTypeRequiredDescription
namestringno
policystringno
rulesstringno

POST /sys/policy/{name}

Operation ID: policies-write-acl-policy2

Add a new or update an existing policy.

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyesThe name of the policy. Example: “ops”

Request body parameters

ParameterTypeRequiredDescription
policystringnoThe rules of the policy.
rulesstringno⚠️ Deprecated. The rules of the policy.

Responses

204: OK

DELETE /sys/policy/{name}

Operation ID: policies-delete-acl-policy2

Delete the policy with the given name.

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyesThe name of the policy. Example: “ops”

Responses

204: OK

GET /sys/pprof

Operation ID: pprof-index

Returns an HTML page listing the available profiles.

Responses

200: OK

GET /sys/pprof/allocs

Operation ID: pprof-memory-allocations

Returns a sampling of all past memory allocations.

Responses

200: OK

GET /sys/pprof/block

Operation ID: pprof-blocking

Returns stack traces that led to blocking on synchronization primitives

Responses

200: OK

GET /sys/pprof/cmdline

Operation ID: pprof-command-line

Returns the running program’s command line.

Responses

200: OK

GET /sys/pprof/goroutine

Operation ID: pprof-goroutines

Returns stack traces of all current goroutines.

Responses

200: OK

GET /sys/pprof/heap

Operation ID: pprof-memory-allocations-live

Returns a sampling of memory allocations of live object.

Responses

200: OK

GET /sys/pprof/mutex

Operation ID: pprof-mutexes

Returns stack traces of holders of contended mutexes

Responses

200: OK

GET /sys/pprof/profile

Operation ID: pprof-cpu-profile

Returns a pprof-formatted cpu profile payload.

Responses

200: OK

GET /sys/pprof/symbol

Operation ID: pprof-symbols

Returns the program counters listed in the request.

Responses

200: OK

GET /sys/pprof/threadcreate

Operation ID: pprof-thread-creations

Returns stack traces that led to the creation of new OS threads

Responses

200: OK

GET /sys/pprof/trace

Operation ID: pprof-execution-trace

Returns the execution trace in binary form.

Responses

200: OK

GET /sys/quotas/config

Operation ID: rate-limit-quotas-read-configuration

Create, update and read the quota configuration.

Responses

200: OK

ParameterTypeRequiredDescription
enable_rate_limit_audit_loggingbooleanno
enable_rate_limit_response_headersbooleanno
rate_limit_exempt_pathsarrayno

POST /sys/quotas/config

Operation ID: rate-limit-quotas-configure

Create, update and read the quota configuration.

Request body parameters

ParameterTypeRequiredDescription
enable_rate_limit_audit_loggingbooleannoIf set, starts audit logging of requests that get rejected due to rate limit quota rule violations.
enable_rate_limit_response_headersbooleannoIf set, additional rate limit quota HTTP headers will be added to responses.
rate_limit_exempt_pathsarraynoSpecifies the list of exempt paths from all rate limit quotas. If empty no paths will be exempt.

Responses

204: OK

GET /sys/quotas/lease-count

Operation ID: enterprise-stub-list-quotas-lease-count

Parameters

ParameterTypeLocationRequiredDescription
liststring (true)queryyesMust be set to true

Responses

200: OK

GET /sys/quotas/lease-count/{name}

Operation ID: enterprise-stub-read-quotas-lease-count-name

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyes

Responses

200: OK

POST /sys/quotas/lease-count/{name}

Operation ID: enterprise-stub-write-quotas-lease-count-name

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyes

Responses

200: OK

DELETE /sys/quotas/lease-count/{name}

Operation ID: enterprise-stub-delete-quotas-lease-count-name

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyes

Responses

204: empty body

GET /sys/quotas/rate-limit

Operation ID: rate-limit-quotas-list

Lists the names of all the rate limit quotas.

Parameters

ParameterTypeLocationRequiredDescription
liststring (true)queryyesMust be set to true

Responses

200: OK

ParameterTypeRequiredDescription
keysarrayno

GET /sys/quotas/rate-limit/{name}

Operation ID: rate-limit-quotas-read

Get, create or update rate limit resource quota for an optional namespace or mount.

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyesName of the quota rule.

Responses

200: OK

ParameterTypeRequiredDescription
block_intervalintegerno
intervalintegerno
namestringno
pathstringno
ratenumberno
rolestringno
typestringno

POST /sys/quotas/rate-limit/{name}

Operation ID: rate-limit-quotas-write

Get, create or update rate limit resource quota for an optional namespace or mount.

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyesName of the quota rule.

Request body parameters

ParameterTypeRequiredDescription
block_intervalintegernoIf set, when a client reaches a rate limit threshold, the client will be prohibited from any further requests until after the ‘block_interval’ has elapsed.
intervalintegernoThe duration to enforce rate limiting for (default ‘1s’).
pathstringnoPath of the mount or namespace to apply the quota. A blank path configures a global quota. For example namespace1/ adds a quota to a full namespace, namespace1/auth/userpass adds a quota to userpass in namespace1.
ratenumbernoThe maximum number of requests in a given interval to be allowed by the quota rule. The ‘rate’ must be positive.
rolestringnoLogin role to apply this quota to. Note that when set, path must be configured to a valid auth method with a concept of roles.
typestringnoType of the quota rule.

Responses

204: No Content

DELETE /sys/quotas/rate-limit/{name}

Operation ID: rate-limit-quotas-delete

Get, create or update rate limit resource quota for an optional namespace or mount.

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyesName of the quota rule.

Responses

204: OK

GET /sys/rekey/backup

Operation ID: rekey-read-backup-key

Return the backup copy of PGP-encrypted unseal keys.

Responses

200: OK

ParameterTypeRequiredDescription
keysobjectno
keys_base64objectno
noncestringno

DELETE /sys/rekey/backup

Operation ID: rekey-delete-backup-key

Delete the backup copy of PGP-encrypted unseal keys.

Responses

204: OK

GET /sys/rekey/init

Operation ID: rekey-attempt-read-progress

Reads the configuration and progress of the current rekey attempt.

Available without authentication: yes

Responses

200: OK

ParameterTypeRequiredDescription
backupbooleanno
nintegerno
nouncestringno
pgp_fingerprintsarrayno
progressintegerno
requiredintegerno
startedstringno
tintegerno
verification_noncestringno
verification_requiredbooleanno

POST /sys/rekey/init

Operation ID: rekey-attempt-initialize

Initializes a new rekey attempt.

Available without authentication: yes

Request body parameters

ParameterTypeRequiredDescription
backupbooleannoSpecifies if using PGP-encrypted keys, whether Stronghold should also store a plaintext backup of the PGP-encrypted keys.
pgp_keysarraynoSpecifies an array of PGP public keys used to encrypt the output unseal keys. Ordering is preserved. The keys must be base64-encoded from their original binary representation. The size of this array must be the same as secret_shares.
require_verificationbooleannoTurns on verification functionality
secret_sharesintegernoSpecifies the number of shares to split the unseal key into.
secret_thresholdintegernoSpecifies the number of shares required to reconstruct the unseal key. This must be less than or equal secret_shares. If using Stronghold HSM with auto-unsealing, this value must be the same as secret_shares.

Responses

200: OK

ParameterTypeRequiredDescription
backupbooleanno
nintegerno
nouncestringno
pgp_fingerprintsarrayno
progressintegerno
requiredintegerno
startedstringno
tintegerno
verification_noncestringno
verification_requiredbooleanno

DELETE /sys/rekey/init

Operation ID: rekey-attempt-cancel

Cancels any in-progress rekey.

Available without authentication: yes

Responses

200: OK

GET /sys/rekey/recovery-key-backup

Operation ID: rekey-read-backup-recovery-key

Allows fetching or deleting the backup of the rotated unseal keys.

Responses

200: OK

ParameterTypeRequiredDescription
keysobjectno
keys_base64objectno
noncestringno

DELETE /sys/rekey/recovery-key-backup

Operation ID: rekey-delete-backup-recovery-key

Allows fetching or deleting the backup of the rotated unseal keys.

Responses

204: OK

POST /sys/rekey/update

Operation ID: rekey-attempt-update

Enter a single unseal key share to progress the rekey of the Stronghold.

Available without authentication: yes

Request body parameters

ParameterTypeRequiredDescription
keystringnoSpecifies a single unseal key share.
noncestringnoSpecifies the nonce of the rekey attempt.

Responses

200: OK

ParameterTypeRequiredDescription
backupbooleanno
completebooleanno
keysarrayno
keys_base64arrayno
nintegerno
nouncestringno
pgp_fingerprintsarrayno
progressintegerno
requiredintegerno
startedstringno
tintegerno
verification_noncestringno
verification_requiredbooleanno

GET /sys/rekey/verify

Operation ID: rekey-verification-read-progress

Read the configuration and progress of the current rekey verification attempt.

Available without authentication: yes

Responses

200: OK

ParameterTypeRequiredDescription
nintegerno
nouncestringno
progressintegerno
startedstringno
tintegerno

POST /sys/rekey/verify

Operation ID: rekey-verification-update

Enter a single new key share to progress the rekey verification operation.

Available without authentication: yes

Request body parameters

ParameterTypeRequiredDescription
keystringnoSpecifies a single unseal share key from the new set of shares.
noncestringnoSpecifies the nonce of the rekey verification operation.

Responses

200: OK

ParameterTypeRequiredDescription
completebooleanno
nouncestringno

DELETE /sys/rekey/verify

Operation ID: rekey-verification-cancel

Cancel any in-progress rekey verification operation.

Available without authentication: yes

Responses

200: OK

ParameterTypeRequiredDescription
nintegerno
nouncestringno
progressintegerno
startedstringno
tintegerno

POST /sys/remount

Operation ID: remount

Initiate a mount migration

Required sudo: yes

Request body parameters

ParameterTypeRequiredDescription
fromstringnoThe previous mount point.
tostringnoThe new mount point.

Responses

200: OK

ParameterTypeRequiredDescription
migration_idstringno

GET /sys/remount/status/{migration_id}

Operation ID: remount-status

Check status of a mount migration

Parameters

ParameterTypeLocationRequiredDescription
migration_idstringpathyesThe ID of the migration operation

Responses

200: OK

ParameterTypeRequiredDescription
migration_idstringno
migration_infoobjectno

POST /sys/renew

Operation ID: leases-renew-lease2

Renews a lease, requesting to extend the lease.

Request body parameters

ParameterTypeRequiredDescription
incrementintegernoThe desired increment in seconds to the lease
lease_idstringnoThe lease identifier to renew. This is included with a lease.
url_lease_idstringnoThe lease identifier to renew. This is included with a lease.

Responses

204: OK

POST /sys/renew/{url_lease_id}

Operation ID: leases-renew-lease-with-id2

Renews a lease, requesting to extend the lease.

Parameters

ParameterTypeLocationRequiredDescription
url_lease_idstringpathyesThe lease identifier to renew. This is included with a lease.

Request body parameters

ParameterTypeRequiredDescription
incrementintegernoThe desired increment in seconds to the lease
lease_idstringnoThe lease identifier to renew. This is included with a lease.

Responses

204: OK

GET /sys/replication/status

Operation ID: system-read-replication-status

Available without authentication: yes

Responses

200: OK

POST /sys/revoke

Operation ID: leases-revoke-lease2

Revokes a lease immediately.

Request body parameters

ParameterTypeRequiredDescription
lease_idstringnoThe lease identifier to renew. This is included with a lease.
syncboolean (default: True)noWhether or not to perform the revocation synchronously
url_lease_idstringnoThe lease identifier to renew. This is included with a lease.

Responses

204: OK

POST /sys/revoke-force/{prefix}

Operation ID: leases-force-revoke-lease-with-prefix2

Revokes all secrets or tokens generated under a given prefix immediately

Required sudo: yes

Parameters

ParameterTypeLocationRequiredDescription
prefixstringpathyesThe path to revoke keys under. Example: “prod/aws/ops”

Responses

204: OK

POST /sys/revoke-prefix/{prefix}

Operation ID: leases-revoke-lease-with-prefix2

Revokes all secrets (via a lease ID prefix) or tokens (via the tokens’ path property) generated under a given prefix immediately.

Required sudo: yes

Parameters

ParameterTypeLocationRequiredDescription
prefixstringpathyesThe path to revoke keys under. Example: “prod/aws/ops”

Request body parameters

ParameterTypeRequiredDescription
syncboolean (default: True)noWhether or not to perform the revocation synchronously

Responses

204: OK

POST /sys/revoke/{url_lease_id}

Operation ID: leases-revoke-lease-with-id2

Revokes a lease immediately.

Parameters

ParameterTypeLocationRequiredDescription
url_lease_idstringpathyesThe lease identifier to renew. This is included with a lease.

Request body parameters

ParameterTypeRequiredDescription
lease_idstringnoThe lease identifier to renew. This is included with a lease.
syncboolean (default: True)noWhether or not to perform the revocation synchronously

Responses

204: OK

POST /sys/rotate

Operation ID: encryption-key-rotate

Rotates the backend encryption key used to persist data.

Required sudo: yes

Responses

204: OK

GET /sys/rotate/config

Operation ID: encryption-key-read-rotation-configuration

Configures settings related to the backend encryption key management.

Responses

200: OK

ParameterTypeRequiredDescription
enabledbooleanno
intervalintegerno
max_operationsintegerno

POST /sys/rotate/config

Operation ID: encryption-key-configure-rotation

Configures settings related to the backend encryption key management.

Request body parameters

ParameterTypeRequiredDescription
enabledbooleannoWhether automatic rotation is enabled.
intervalintegernoHow long after installation of an active key term that the key will be automatically rotated.
max_operationsintegernoThe number of encryption operations performed before the barrier key is automatically rotated.

Responses

204: OK

POST /sys/seal

Operation ID: seal

Seal the Stronghold.

Required sudo: yes

Responses

204: OK

GET /sys/seal-status

Operation ID: seal-status

Check the seal status of a Stronghold.

Available without authentication: yes

Responses

200:

ParameterTypeRequiredDescription
build_datestringno
cluster_idstringno
cluster_namestringno
hcp_link_resource_IDstringno
hcp_link_statusstringno
initializedbooleanno
migrationbooleanno
nintegerno
noncestringno
progressintegerno
recovery_sealbooleanno
sealedbooleanno
storage_typestringno
tintegerno
typestringno
versionstringno

GET /sys/sealwrap/rewrap

Operation ID: system-read-sealwrap-rewrap

Responses

200: OK

POST /sys/sealwrap/rewrap

Operation ID: system-write-sealwrap-rewrap

Responses

200: OK

POST /sys/step-down

Operation ID: step-down-leader

Cause the node to give up active status.

Required sudo: yes

Responses

204: empty body

GET /sys/storage/raft/autopilot/configuration

Operation ID: system-read-storage-raft-autopilot-configuration

Returns autopilot configuration.

Responses

200: OK

POST /sys/storage/raft/autopilot/configuration

Operation ID: system-write-storage-raft-autopilot-configuration

Returns autopilot configuration.

Request body parameters

ParameterTypeRequiredDescription
cleanup_dead_serversbooleannoControls whether to remove dead servers from the Raft peer list periodically or when a new server joins.
dead_server_last_contact_thresholdintegernoLimit on the amount of time a server can go without leader contact before being considered failed. This takes effect only when cleanup_dead_servers is set.
disable_upgrade_migrationbooleannoWhether or not to perform automated version upgrades.
dr_operation_tokenstringnoDR operation token used to authorize this request (if a DR secondary node).
last_contact_thresholdintegernoLimit on the amount of time a server can go without leader contact before being considered unhealthy.
max_trailing_logsintegernoAmount of entries in the Raft Log that a server can be behind before being considered unhealthy.
min_quorumintegernoMinimum number of servers allowed in a cluster before autopilot can prune dead servers. This should at least be 3.
server_stabilization_timeintegernoMinimum amount of time a server must be in a stable, healthy state before it can be added to the cluster.

Responses

200: OK

GET /sys/storage/raft/autopilot/state

Operation ID: system-read-storage-raft-autopilot-state

Returns the state of the raft cluster under integrated storage as seen by autopilot.

Responses

200: OK

POST /sys/storage/raft/bootstrap/answer

Operation ID: system-write-storage-raft-bootstrap-answer

Accepts an answer from the peer to be joined to the fact cluster.

Available without authentication: yes

Request body parameters

ParameterTypeRequiredDescription
answerstringno
cluster_addrstringno
non_voterbooleanno
server_idstringno

Responses

200: OK

POST /sys/storage/raft/bootstrap/challenge

Operation ID: system-write-storage-raft-bootstrap-challenge

Creates a challenge for the new peer to be joined to the raft cluster.

Available without authentication: yes

Request body parameters

ParameterTypeRequiredDescription
server_idstringno

Responses

200: OK

GET /sys/storage/raft/configuration

Operation ID: system-read-storage-raft-configuration

Returns the configuration of the raft cluster.

Responses

200: OK

POST /sys/storage/raft/configuration

Operation ID: system-write-storage-raft-configuration

Returns the configuration of the raft cluster in a DR secondary cluster.

Request body parameters

ParameterTypeRequiredDescription
dr_operation_tokenstringnoDR operation token used to authorize this request (if a DR secondary node).

Responses

200: OK

POST /sys/storage/raft/demote

Operation ID: system-write-storage-raft-demote

Demotes a voter to a permanent non-voter.

Request body parameters

ParameterTypeRequiredDescription
server_idstringno

Responses

200: OK

POST /sys/storage/raft/promote

Operation ID: system-write-storage-raft-promote

Promotes a permanent non-voter to a voter.

Request body parameters

ParameterTypeRequiredDescription
server_idstringno

Responses

200: OK

POST /sys/storage/raft/remove-peer

Operation ID: system-write-storage-raft-remove-peer

Remove a peer from the raft cluster.

Request body parameters

ParameterTypeRequiredDescription
dr_operation_tokenstringnoDR operation token used to authorize this request (if a DR secondary node).
server_idstringno

Responses

200: OK

GET /sys/storage/raft/snapshot

Operation ID: system-read-storage-raft-snapshot

Returns a snapshot of the current state of vault.

Responses

200: OK

POST /sys/storage/raft/snapshot

Operation ID: system-write-storage-raft-snapshot

Installs the provided snapshot, returning the cluster to the state defined in it.

Responses

200: OK

GET /sys/storage/raft/snapshot-auto/config

Operation ID: system-list-storage-raft-snapshot-auto-config

Lists all automatic snapshot configuration names.

Parameters

ParameterTypeLocationRequiredDescription
liststring (true)queryyesMust be set to true

Responses

200: OK

GET /sys/storage/raft/snapshot-auto/config/{name}

Operation ID: system-read-storage-raft-snapshot-auto-config-name

Gets the configuration of the automatic snapshot.

Required sudo: yes

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyesName of the configuration to modify.

Responses

200: OK

POST /sys/storage/raft/snapshot-auto/config/{name}

Operation ID: system-write-storage-raft-snapshot-auto-config-name

Updates the configuration of the automatic snapshot.

Required sudo: yes

Creation supported: yes

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyesName of the configuration to modify.

Request body parameters

ParameterTypeRequiredDescription
aws_access_key_idstringnoS3 access key ID.
aws_s3_bucketstringyesS3 bucket to write snapshots to.
aws_s3_ca_certificatestring (default: )noS3 CA certificate PEM.
aws_s3_disable_tlsboolean (default: False)noDisable TLS for the S3 endpoint. This should only be used for testing purposes, typically in conjunction with s3_endpoint.
aws_s3_endpointstringnoS3 endpoint.
aws_s3_regionstring (default: )noS3 region bucket is in.
aws_secret_access_keystringnoS3 secret access key.
file_prefixstring (default: stronghold-snapshot)noWithin the directory or bucket prefix given by path_prefix, the file or object name of snapshot files will start with this string.
intervalintegeryesTime between snapshots. This can be either an integer number of seconds, or a Go duration format string (e.g. 24h).
local_max_spaceinteger (default: 0)yesFor storage_type=local, the maximum space, in bytes, to use for all snapshots with the given file_prefix in the path_prefix directory. Snapshot attempts will fail if there is not enough space left in this allowance. Value 0 disables limit.
path_prefixstringyesFor storage_type=local, the directory to write the snapshots in. For cloud storage types, the bucket prefix to use, also leading / is ignored. The trailing / is optional.
retaininteger (default: 3)noHow many snapshots are to be kept; when writing a snapshot, if there are more snapshots already stored than this number, the oldest ones will be deleted.
storage_typestring (local, aws-s3)yesOne of “local” or “s3”. The remaining parameters described below are all specific to the selected storage_type and prefixed accordingly.

Responses

200: OK

DELETE /sys/storage/raft/snapshot-auto/config/{name}

Operation ID: system-delete-storage-raft-snapshot-auto-config-name

Deletes the configuration of the automatic snapshot.

Required sudo: yes

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyesName of the configuration to modify.

Responses

204: empty body

GET /sys/storage/raft/snapshot-auto/status/{name}

Operation ID: system-read-storage-raft-snapshot-auto-status-name

Shows the status of the automatic snapshot.

Parameters

ParameterTypeLocationRequiredDescription
namestringpathyesName of the status to get.

Responses

200: OK

POST /sys/storage/raft/snapshot-force

Operation ID: system-write-storage-raft-snapshot-force

Installs the provided snapshot, returning the cluster to the state defined in it. This bypasses checks ensuring the current Autounseal or Shamir keys are consistent with the snapshot data.

Responses

200: OK

POST /sys/tools/hash

Operation ID: generate-hash

Generate a hash sum for input data

Request body parameters

ParameterTypeRequiredDescription
algorithmstring (default: sha2-256)noAlgorithm to use (POST body parameter). Valid values are: sha2-224 sha2-256 sha2-384 sha2-512 streebog-256 streebog-512 Defaults to “sha2-256”.
formatstring (default: hex)noEncoding format to use. Can be “hex” or “base64”. Defaults to “hex”.
inputstringnoThe base64-encoded input data
urlalgorithmstringnoAlgorithm to use (POST URL parameter)

Responses

200: OK

ParameterTypeRequiredDescription
sumstringno

POST /sys/tools/hash/{urlalgorithm}

Operation ID: generate-hash-with-algorithm

Generate a hash sum for input data

Parameters

ParameterTypeLocationRequiredDescription
urlalgorithmstringpathyesAlgorithm to use (POST URL parameter)

Request body parameters

ParameterTypeRequiredDescription
algorithmstring (default: sha2-256)noAlgorithm to use (POST body parameter). Valid values are: sha2-224 sha2-256 sha2-384 sha2-512 streebog-256 streebog-512 Defaults to “sha2-256”.
formatstring (default: hex)noEncoding format to use. Can be “hex” or “base64”. Defaults to “hex”.
inputstringnoThe base64-encoded input data

Responses

200: OK

ParameterTypeRequiredDescription
sumstringno

POST /sys/tools/random

Operation ID: generate-random

Generate random bytes

Request body parameters

ParameterTypeRequiredDescription
bytesinteger (default: 32)noThe number of bytes to generate (POST body parameter). Defaults to 32 (256 bits).
formatstring (default: base64)noEncoding format to use. Can be “hex” or “base64”. Defaults to “base64”.
sourcestring (default: platform)noWhich system to source random data from, ether “platform”, “seal”, or “all”.
urlbytesstringnoThe number of bytes to generate (POST URL parameter)

Responses

200: OK

ParameterTypeRequiredDescription
random_bytesstringno

POST /sys/tools/random/{source}

Operation ID: generate-random-with-source

Generate random bytes

Parameters

ParameterTypeLocationRequiredDescription
sourcestringpathyesWhich system to source random data from, ether “platform”, “seal”, or “all”.

Request body parameters

ParameterTypeRequiredDescription
bytesinteger (default: 32)noThe number of bytes to generate (POST body parameter). Defaults to 32 (256 bits).
formatstring (default: base64)noEncoding format to use. Can be “hex” or “base64”. Defaults to “base64”.
urlbytesstringnoThe number of bytes to generate (POST URL parameter)

Responses

200: OK

ParameterTypeRequiredDescription
random_bytesstringno

POST /sys/tools/random/{source}/{urlbytes}

Operation ID: generate-random-with-source-and-bytes

Generate random bytes

Parameters

ParameterTypeLocationRequiredDescription
sourcestringpathyesWhich system to source random data from, ether “platform”, “seal”, or “all”.
urlbytesstringpathyesThe number of bytes to generate (POST URL parameter)

Request body parameters

ParameterTypeRequiredDescription
bytesinteger (default: 32)noThe number of bytes to generate (POST body parameter). Defaults to 32 (256 bits).
formatstring (default: base64)noEncoding format to use. Can be “hex” or “base64”. Defaults to “base64”.

Responses

200: OK

ParameterTypeRequiredDescription
random_bytesstringno

POST /sys/tools/random/{urlbytes}

Operation ID: generate-random-with-bytes

Generate random bytes

Parameters

ParameterTypeLocationRequiredDescription
urlbytesstringpathyesThe number of bytes to generate (POST URL parameter)

Request body parameters

ParameterTypeRequiredDescription
bytesinteger (default: 32)noThe number of bytes to generate (POST body parameter). Defaults to 32 (256 bits).
formatstring (default: base64)noEncoding format to use. Can be “hex” or “base64”. Defaults to “base64”.
sourcestring (default: platform)noWhich system to source random data from, ether “platform”, “seal”, or “all”.

Responses

200: OK

ParameterTypeRequiredDescription
random_bytesstringno

POST /sys/unseal

Operation ID: unseal

Unseal the Stronghold.

Available without authentication: yes

Request body parameters

ParameterTypeRequiredDescription
keystringnoSpecifies a single unseal key share. This is required unless reset is true.
resetbooleannoSpecifies if previously-provided unseal keys are discarded and the unseal process is reset.

Responses

200:

ParameterTypeRequiredDescription
build_datestringno
cluster_idstringno
cluster_namestringno
hcp_link_resource_IDstringno
hcp_link_statusstringno
initializedbooleanno
migrationbooleanno
nintegerno
noncestringno
progressintegerno
recovery_sealbooleanno
sealedbooleanno
storage_typestringno
tintegerno
typestringno
versionstringno

GET /sys/version-history

Operation ID: version-history

Returns map of historical version change entries

Parameters

ParameterTypeLocationRequiredDescription
liststring (true)queryyesMust be set to true

Responses

200: OK

ParameterTypeRequiredDescription
key_infoobjectno
keysarrayno

GET /sys/wrapping/lookup

Operation ID: read-wrapping-properties2

Look up wrapping properties for the requester’s token.

Available without authentication: yes

Responses

200: OK

ParameterTypeRequiredDescription
creation_pathstringno
creation_timestringno
creation_ttlintegerno

POST /sys/wrapping/lookup

Operation ID: read-wrapping-properties

Look up wrapping properties for the given token.

Available without authentication: yes

Request body parameters

ParameterTypeRequiredDescription
tokenstringno

Responses

200: OK

ParameterTypeRequiredDescription
creation_pathstringno
creation_timestringno
creation_ttlintegerno

POST /sys/wrapping/rewrap

Operation ID: rewrap

Rotates a response-wrapped token.

Request body parameters

ParameterTypeRequiredDescription
tokenstringno

Responses

200: OK

POST /sys/wrapping/unwrap

Operation ID: unwrap

Unwraps a response-wrapped token.

Request body parameters

ParameterTypeRequiredDescription
tokenstringno

Responses

200: OK

204: No content

POST /sys/wrapping/wrap

Operation ID: wrap

Response-wraps an arbitrary JSON object.

Responses

200: OK