
Vault tokens carry policies that define permissions, grant access to secrets, and are central to audit logging. Effective token management helps maintain a secure and compliant Vault deployment.
| Objective | Description |
|---|---|
| 1 | Describe what a Vault token is and its components |
| 2 | Differentiate between service and batch tokens |
| 3 | Explain the root token’s uses and lifecycle |
| 4 | Define token accessors and their use cases |
| 5 | Explain time-to-live (TTL) and renewal mechanics |
| 6 | Distinguish orphan, periodic, service, and other token types |
| 7 | Select the appropriate token type based on operational requirements |