Vault Entities
A Vault Entity is the canonical representation of a user or machine (Vault client). When a unique client first authenticates, Vault’s Identity Secrets Engine creates an entity:
- Every entity has its own unique ID (
canonical_id). - Zero or more Aliases can link different auth methods and identifiers to the same entity.
- Attach policies and metadata (e.g., department, team) directly to an entity for centralized authorization.
Entities simplify auditing and policy management by providing a single point to attach metadata and policies.
Entity Aliases
An alias connects an auth method (e.g., Userpass, LDAP, GitHub) and the user’s login identifier to an entity. If no matching alias exists at login, Vault automatically creates both the entity and its alias.
| Auth Method | Login Identifier | Assigned Policy |
|---|---|---|
| Userpass | JSmith | accounting |
| LDAP | [email protected] | finance |
| GitHub | JSmith22 | accounts_payable |
Unifying Aliases Under One Entity
To grant Julie all her permissions in a single login, manually create one entity and map all aliases to it. Entities and aliases contribute their policies additively.-
Create Julie’s entity with management metadata:
Save the returned
entity_id(thecanonical_id). -
Add each alias, using the appropriate
mount_accessorfor the auth method:Get yourmount_accessorvalues with:
Ensure each
mount_accessor matches the correct auth path. Misconfigured accessors may lead to orphaned aliases.- Policies from the alias (e.g.,
finance) - Policies from the entity (e.g.,
it-management)

Vault Groups
Groups let you bundle multiple entities (and even other groups) under shared policies. This structure scales permission management across teams.
| Group Name | Members | Group Policy |
|---|---|---|
finance_team | maria.she, john.lee | finance |
- Maria Shi (alias
maria.she) hasbase_uservia her entity. - John Lee (alias
john.lee) hassuperuservia his entity.
- He inherits
superuser(alias). - He gets
management(entity). - He also receives
finance(group).
Internal vs. External Groups

Internal Groups
- Defined and managed solely within Vault.
- Ideal for grouping entities that share identical permission sets.
- Permissions automatically propagate into child namespaces without reconfiguring auth backends.

External Groups
- Created in Vault to mirror groups from external identity providers (LDAP, Okta, OIDC).
- Membership is controlled at the IDP—Vault simply assigns matching policies.
- Automatically keeps Vault policies in sync with your existing corporate groups.

- Enable and configure the auth method (e.g., LDAP).
- Create an external group in Vault matching the IDP’s group name.
- Attach policies to that external group.
- Users in the IDP group inherit those policies on Vault login.
Further Reading and References
- Vault Identity Secrets Engine
- Vault Authentication Methods
- Vault Namespaces
- HashiCorp Vault Documentation