prd-hashicorp-vault01.vergesense.com Open in urlscan Pro
104.18.10.113  Public Scan

Submitted URL: https://prd-hashicorp-vault01.vergesense.com/
Effective URL: https://prd-hashicorp-vault01.vergesense.com/ui/
Submission: On June 27 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

<form id="auth-form">
  <div class="field">
    <label for="token" class="is-label">Token</label>
    <div class="control">
      <input id="token" class="ember-text-field ember-view input" name="token" autocomplete="off" spellcheck="false" type="password">
    </div>
  </div>
  <!----> <button class="hds-button hds-button--color-primary hds-button--size-medium" id="auth-submit" type="submit">
    <span class="hds-button__text"> Sign in </span>
  </button>
  <!---->
</form>

Text Content

SIGN IN TO VAULT


Method
Token Username LDAP Okta JWT OIDC RADIUS GitHub
Token

Sign in

Contact your administrator for login credentials.

   
   
   
   
   
   
 * Vault
 * Upgrade to Vault Enterprise
 * Documentation
 * * Support
   * Terms
   * Privacy
   * Security
   * Accessibility

© 2024 HashiCorp

The Vault Web REPL provides an easy way to execute common Vault CLI commands,
such as write, read, delete, and list. It does not include KV version 2 write or
put commands. For guidance, type `help`. For more detailed documentation, see
the HashiCorp Developer site.

Examples:

→ Write secrets to kv v1: write <mount>/my-secret foo=bar

→ List kv v1 secret keys: list <mount>/

→ Read a kv v1 secret: read <mount>/my-secret

→ Mount a kv v2 secret engine: write sys/mounts/<mount> type=kv
options=version=2

→ Read a kv v2 secret: kv-get <mount>/secret-path

→ Read a kv v2 secret's metadata: kv-get <mount>/secret-path -metadata