Control groups require designated approvers to authorize requests for sensitive Vault paths, enhancing security through multi-party approval.
Control groups provide an extra layer of approval for sensitive Vault paths, requiring designated approvers to explicitly authorize each request. This feature is covered in the Vault Certified Operations Professional exam and can be useful when you need multi-party approval on top of ACL and Sentinel policies.
Control groups are rarely used in production environments but are essential for high-security workflows and exam preparation.
Any Sentinel policies applied to the token or path
With a control group configured on a path, Vault enforces a third requirement: an explicit approval step from one or more designated identity groups before returning secrets.
Control groups can also be enforced in Sentinel as an External Governance Policy (EGP). This example requires at least two approvals from account-managers:
Copy
Ask AI
import "controlgroup"control_group = func() { numAuthzs = 0 for controlgroup.authorizations as authz { if "account-managers" in authz.groups.by_name { numAuthzs = numAuthzs + 1 } } return numAuthzs >= 2}main = rule { control_group()}
Deploy this Sentinel policy to enforce the same approval workflow on your protected path.
Control groups add a mandatory multi-party approval step on top of standard ACL and Sentinel policies. While the only supported factor today is an identity group, mastering control groups is crucial for sensitive workflows and the Vault Certified Operations Professional exam.