The Vault team is announcing the release of Vault 1.10.0!
Open-source binaries can be downloaded at . Enterprise binaries are available to customers as well.
As a reminder, if you believe you have found a security issue in Vault, please responsibly disclose by emailing firstname.lastname@example.org and do not use the public issue tracker. Our security policy and our PGP key can be found at .
The major features and improvements in 1.10 are:
- Database Plugin Multiplexing: External database plugins now use a single process for multiple database connections, reducing memory consumption. The Oracle database plugin  is the first to leverage this capability.
- Login MFA: 1.10 adds MFA for logins to open source Vault, replacing the deprecated  Legacy OSS MFA, which will be removed in Vault 1.11. Login MFA is configurable on individual namespaces. The current Step-up Enterprise MFA feature  remains unchanged.
- Client Count Improvements: 1.10 adds ability to view client counts per auth mount (UI and API) and changes to clients over months (API), providing more granular visibility into clients.
- Mount Migration: Vault 1.10 expands remounting capabilities. It adds support for remounting auth methods to the existing remount support for secrets engines. In Enterprise, it is possible to move secret engines and auth methods mounted at a namespace path to a different namespace path.
- Server Side Consistent Tokens: In Vault 1.10 the token format is changing. The new token format will allow more control over our consistency model, allowing performance standby nodes to decide whether to forward requests if they are behind the active node. The token prefix has also been updated, to make it easier for static-analysis code scanning tools to scan for Vault tokens.
- Public Key Infrastructure - Managed Key integration: 1.10 adds the ability to use hardware security modules as well as cloud key management systems to create, store and utilize CA private keys. PKCS#11 HSMs (Enterprise license required), Azure Key Vault, and AWS KMS are supported.
- Vault as an OIDC provider - General Availability: 1.10 now moves Vault’s OIDC provider functionality to generally available and has added Proof Key for Code Exchange (PKCE) support.
- Vault Agent Telemetry: Starting in 1.10 the Vault Agent now has support for a new metrics endpoint and telemetry metrics around run time, authentication success, authentication failures, cache hits, cache misses, proxy success, and proxy client errors.
See the Changelog at  for the full list of improvements and bug fixes and the release documentation pages at .
See the Feature Deprecation Notice and Plans page  for our upcoming feature deprecation plans.
OSS  and Enterprise  Docker images will be available soon.
See  for general upgrade instructions, and  for upgrade notes on 1.10 specifically.
As always, we recommend upgrading and testing this release in an isolated environment. If you experience any non-security issues, please report them on the Vault GitHub issue tracker or post to the Vault Discuss Forum at .
We hope you enjoy Vault 1.10.0!
Sincerely, The Vault Team
 Vault v1.10.0 Binaries | HashiCorp Releases
 Security at HashiCorp
 Oracle - Database - Secrets Engines | Vault by HashiCorp
 MFA Support - Vault Enterprise | Vault by HashiCorp
 vault/CHANGELOG.md at main · hashicorp/vault · GitHub
 Upgrading Vault - Guides | Vault by HashiCorp
 Docker Hub
 Docker Hub
 Feature Deprecation Notice | Vault by HashiCorp
 Vault - HashiCorp Discuss
 Upgrading to Vault 1.10.x - Guides | Vault by HashiCorp
 Release Notes | Vault by HashiCorp