Architecture Overview
One Vault cluster (the “unsealer”) runs the Transit Secrets Engine and holds the encryption key for unsealing. Other clusters delegate their unseal operations to this central cluster:

Key Features

| Feature | Description |
|---|---|
| Dedicated Transit Engine | Uses a separate Vault cluster’s Transit Secrets Engine for master key protection. |
| Key Rotation Support | Rotate the unseal key regularly to meet compliance and security requirements. |
| Open Source & Enterprise Ready | Available in Vault OSS and Enterprise editions without additional plugins. |
| High Availability Requirement | The Transit cluster must be HA with a resilient backend; downtime halts auto-unseal actions. |
If the central Transit cluster becomes unavailable, all dependent Vault clusters will fail to unseal. Ensure your Transit cluster is highly available and monitored.
Configuration
To enable Transit Auto Unseal, add aseal stanza to your Vault configuration file:
addressandtokenpoint to the central Vault cluster running Transit.key_name,mount_path, andnamespaceidentify which key to use.- TLS settings ensure secure communication between clusters.