Using the Secret Manager with the HashiCorp Vault KV2 compliant API
Objective
The objective of this guide is to present the use of the HashiCorp Vault KV2 compliant API for the Secret Manager.
Requirements
Instructions
Description
The Secret Manager is a product that allows you to securely store credentials, API keys, SSH keys, or any other type of secret necessary for the operation of your applications.
A secret is a collection of one or more key-value pairs grouped within a version. Each modification of a secret creates a new version of that secret, allowing you to go back in the history of changes to the secret.
The HashiCorp Vault KV2 compliant APIs are one of the two API sets offered by the Secret Manager, along with the REST API. They are designed to be similar to HashiCorp Vault APIs to ensure compatibility with applications already compatible with HashiCorp Vault.
Contacting the OKMS domain
Communication with the OKMS domain for encryption and signature actions is available via APIs.
Since the OKMS domain is regionalized, you can access the API directly in its region: https://my-region.ovh.com.net.
For example, for a OKMS domain created in the eu-west-rbx region: https://eu-west-rbx.okms.ovh.net.
It's possible to communicate with the OKMS domain using:
- The Swagger UI
- The OMKS CLI: https://github.com/ovh/okms-cli
- The Golang SDK: https://pkg.go.dev/github.com/ovh/okms-sdk-go
Using the OKMS domain API via the Swagger UI
You can access the OKMS domain Swagger UI by clicking on the link in the OVHcloud Control Panel, in your OKMS domain dashboard.

You will land on the non-authenticated version of the Swagger UI, that is meant for API documentation purposes. If you want to use the Swagger UI to make requests on your own OKMS domain, you will need to switch to the authenticated version, whose link is in the description section:

The next steps will guide you on how to authenticate.
Importing your OKMS domain credentials into the browser
To access the authenticated Swagger UI, you need to load your OKMS access certificate into the browser Certificate Manager.
For that, it is required to convert it to PKCS#12 format. PKCS#12 is a binary format for storing a certificate chain and private key in a single, encrypted file. It is commonly used for importing and exporting certificates and private keys, especially in environments that require secure transport of these items, such as web servers and client applications.
To convert your OKMS domain credentials (assuming you saved them into files named ID_certificate.pem and ID_privatekey.pem) to PKCS#12 with the openssl Command Line Interface, use the following command:
You will be prompted to enter a password that will be used for the symmetrical encryption of the file content. Then, you need to import it into your web browser.
On Firefox
- Type
about:preferences#privacyinto the address bar. - Scroll down until reaching a section named
Certificates.

- Click
View Certificates...to open the Certificate Manager. - Go to the tab named
My Certificates, thenImport...and select the location of yourclient.p12file. - You will be prompted to enter the password you used during the PKCS#12 file creation.
- After entering the password, your certificate will be imported and ready for use.
On Chrome/Chromium
- Type
chrome://settings/certificatesinto the address bar. - Go to the
Your certificatestab. ClickImportand select yourclient.p12file. - You will be prompted to enter the password you used during the PKCS#12 file creation.
- After entering the password, your certificate will be imported and ready for use.

Accessing the authenticated Swagger UI
Once your certificate is loaded into your browser, you can go to the authenticated Swagger UI.
You will be prompted to identify yourself with a certificate. Select the previously imported PKCS#12 certificate in the drop-down list.

You can now use the Swagger UI interactively.
Create a Secret
To create a secret, you can use the following API:
The secret's path must be specified in the API path.
The API expects the following values:
For example:
It is also possible to add metadata to the secret via the API:
The API expects the following values:
For example:
Manage Secrets
Update Metadata and configuration
Once the secret is created, it is possible to update the secret's metadata or configuration.
The API expects the following values:
It is also possible to change the default configuration of the OKMS domain for the values cas_required, deactivate_version_after, and max_versions using the API:
Create a new version
It is also possible to modify the secret's content, which implies creating a new version for the secret. New versions can be created using the API:
A secret can contain as many versions as desired, up to the maximum limit of the max_versions parameter. If the maximum number of versions is reached, the oldest version is automatically deleted.
Manage versions
It is possible to manage the different versions of the secret using the API:
Deactivated versions of a secret are still present in the Secret Manager, but their content is no longer accessible.
It is possible to reactivate a version via the API:
Finally, it is possible to permanently delete a version via the API:
It's also possible to permanently delete the whole secret with all his versions:
A deleted version is no longer present in the Secret Manager and cannot be reactivated.
Go further
Join our community of users.