• HashiCorp Developer

  • HashiCorp Cloud Platform
  • Terraform
  • Packer
  • Consul
  • Vault
  • Boundary
  • Nomad
  • Waypoint
  • Vagrant
Vault
  • Install
  • Tutorials
  • Documentation
  • API
  • Integrations
  • Try Cloud(opens in new tab)
  • Sign up
Associate

Skip to main content
3 tutorials
  • Study Guide - Vault Associate Certification
  • Sample Questions - Vault Associate Certification
  • Review Guide - Vault Associate Certification

  • Resources

  • Tutorial Library
  • Certifications
  • Community Forum
    (opens in new tab)
  • Support
    (opens in new tab)
  • GitHub
    (opens in new tab)
  1. Developer
  2. Vault
  3. Tutorials
  4. Associate
  5. Review Guide - Vault Associate Certification

Review Guide - Vault Associate Certification

  • 5min

  • VaultVault

Here is a direct mapping of each HashiCorp Certified: Vault Associate exam objective to where it is covered in HashiCorp's documentation or tutorial. This provides experienced exam candidates a place to review just the objectives they need extra help with before taking the exam.

Exam ObjectiveDocumentationTutorial
1Compare authentication methods
1aDescribe authentication methodsAuthenticationAuthentication
1bChoose an authentication method based on use caseAuthenticationAppRole Pull Authentication - Authentication
1cDifferentiate human vs. system auth methodsAuthenticationAppRole Pull Authentication - Authentication
2Create Vault policies
2aIllustrate the value of Vault policyPoliciesVault Policies
2bDescribe Vault policy syntax: pathPolicy SyntaxVault Policies– Write ACL policies in HCL format
2cDescribe Vault policy syntax: capabilitiesCapabilitiesVault Policies– Write ACL policies in HCL format
2dCraft a Vault policy based on requirementsVault Policies– Policy requirements
3Assess Vault tokens
3aDescribe Vault tokenTokensTokens
3bDifferentiate between service and batch tokens.
Choose one based on use case
TokensBatch Tokens
3cDescribe root token uses and lifecycleRoot TokensGenerate Root Tokens Using Unseal Keys
3dDefine token accessorsToken Accessors
3eExplain time-to-liveToken AccessorsService Token Lifecycle
3fExplain orphaned tokensToken Hierarchies and Orphan TokensTokens– Orphan tokens
3gCreate tokens based on needTokens
4Manage Vault leases
4aExplain the purpose of a lease IDLease, Renew, and RevokeSecrets as a Service: Dynamic Secrets
4bRenew leasesLease, Renew, and RevokeSecrets as a Service: Dynamic Secrets
4cRevoke leasesLease, Renew, and RevokeSecrets as a Service: Dynamic Secrets
5Compare and configure Vault secrets engines
5aChoose a secret method based on use caseSecrets Engines
5bContrast dynamic secrets vs. static secrets and their use casesUse Case – Secrets Management
5cDefine transit engineTransit Secrets EngineEncryption as a Service: Transit Secrets Engine
5dDefine secrets enginesSecrets Engines – Overview
6Utilize Vault CLI
6aAuthenticate to VaultAuthenticationAuthentication
6bConfigure authentication methodsAuthentication
6cConfigure Vault policiesPolicies

Vault Policies
6dAccess Vault secretsSecrets Engines

Secrets Management Learning Track
6eEnable Secret enginesSecrets Engines

Secrets Management Learning Track
6fConfigure environment variablesEnvironment VariablesConfigure Vault
7Utilize Vault UI
7aAuthenticate to VaultAuthentication
7bConfigure authentication methodsAuthentication
7cConfigure Vault policiesVault Policies
7dAccess Vault secretsManage Secrets Engine
7eEnable Secret enginesManage Secrets Engine
8Be aware of the Vault API
8aAuthenticate to Vault via CurlAPI – Auth MethodsAppRole Pull Authentication
8bAccess Vault secrets via CurlAPI – Secrets EnginesUsing the HTTP APIs with Authentication
9Explain Vault architecture
9aDescribe the encryption of data stored by VaultIntroduction to Vault
9bDescribe cluster strategyVault Reference Architecture
9cDescribe storage backendsstorage stanzaDeploy Vault
9dDescribe the Vault agentVault AgentVault Agent with AWS
9eDescribe secrets cachingVault AgentVault Agent Caching
9fBe aware of identities and groupsIdentity: Entities and Groups
9gDescribe Shamir secret sharing and unsealingDeploy Vault – Seal/Unseal
9hBe aware of replication Vault Enterprise Replication[Enterprise] Setting up Performance Replication
9iDescribe seal/unsealDeploy Vault – Seal/Unseal
9jExplain response wrappingResponse WrappingCubbyhole Response Wrapping
9kExplain the value of short-lived, dynamically generated secretsSecrets as a Service: Dynamic Secrets

Dynamic Secrets
10Explain encryption as a service
10aConfigure transit secret engineEncryption as a Service: Transit Secrets Engine
10bEncrypt and decrypt secretsEncryption as a Service: Transit Secrets Engine
10cRotate the encryption keyEncryption as a Service: Transit Secrets Engine
 Previous
 Next Collection
Give Feedback(opens in new tab)
  • Certifications
  • System Status
  • Terms of Use
  • Security
  • Privacy
  • Trademark Policy
  • Trade Controls
  • Give Feedback(opens in new tab)