What Happens During Initialization
When you run:- Generate a master key that encrypts the data-encryption key.
- Create a data-encryption key for all subsequent operations.
- Split the master key into key shares (using Shamir’s Secret Sharing) or generate recovery keys if an auto-unseal mechanism is enabled.
- Issue the initial root token for first-time authentication.
Initialization writes to your storage backend only once. If your cluster is lost or restored from backup, you skip initialization and go straight to unsealing.
Key Shares, Thresholds, and Recovery Keys
By default:- Key shares: 5
- Threshold: 3 (number of shares needed to unseal)
Encrypting Unseal Keys and Root Token
Protect your unseal/recovery keys and root token with PGP encryption. Supply one or more public keys during initialization:Initialization Methods
Vault supports three initialization interfaces:| Method | Use Case | Example |
|---|---|---|
| CLI | Stand up a new cluster or quick manual setup | vault operator init |
| API | Automation workflows, CI/CD pipelines | HTTP PUT /v1/sys/init |
| UI | Interactive setup via Vault Web UI | Navigate to System → Initialization |
CLI Examples
Default initialization:Post-Initialization Steps
- Auto-Unseal
Vault contacts the configured KMS/HSM and unseals automatically. - Manual Unseal
Supply unseal key shares on a single Vault node: - Authenticate
Log in with the initial root token: