Federation
Endpoint reference for federated backends (HashiCorp Vault, AWS SM, Azure KV, GCP SM). For deep dive, see Federation Deep Dive.
Base path: /v1/federation/
GET /v1/federation/backends#
List configured backends.
Scope: federation:read.
POST /v1/federation/backends#
Configure a backend.
Body:
| Field | Required | Description |
|---|---|---|
name |
Yes | |
type |
Yes | hashicorp-vault, aws-secrets-manager, azure-key-vault, google-secret-manager |
config |
Yes | Backend-specific |
path_mapping |
Yes | {scaivault_path_pattern: backend_path_template} |
mode |
Yes | proxy or sync |
sync_interval |
For sync |
e.g. 15m |
Example (HashiCorp):
1 2 3 4 5 6 7 8 9 10 11 12 13 14 | |
Example (AWS):
1 2 3 4 5 6 7 8 9 10 11 12 13 | |
Scope: federation:write.
GET /v1/federation/backends/{id}#
PATCH /v1/federation/backends/{id}#
DELETE /v1/federation/backends/{id}#
GET /v1/federation/backends/{id}/status#
Connection and sync status.
Response:
1 2 3 4 5 6 7 8 9 10 11 12 | |
POST /v1/federation/backends/{id}/sync#
Trigger manual sync (for sync mode).
Scope: federation:write.
GET /v1/federation/backends/{id}/conflicts#
List sync conflicts (same path exists locally and remotely with different values).
Modes#
Proxy#
Reads pass through to the backend in real time. Writes to proxied paths are rejected (the backend is the source of truth).
Pros: always fresh. Cons: backend latency + availability impact every read.
Sync#
ScaiVault periodically pulls secrets from the backend into local storage. Reads hit local cache.
Pros: fast, resilient to backend outages. Cons: staleness up to sync_interval.