vault.cloud.bybieyang.com
Open in
urlscan Pro
123.57.174.147
Public Scan
Submitted URL: https://vault.cloud.bybieyang.com/
Effective URL: https://vault.cloud.bybieyang.com/ui/
Submission: On June 19 via api from US — Scanned from DE
Effective URL: https://vault.cloud.bybieyang.com/ui/
Submission: On June 19 via api from US — Scanned from DE
Form analysis
1 forms found in the DOM<form id="auth-form">
<div class="field">
<label for="token" class="is-label">Token</label>
<div class="control">
<input id="token" class="ember-text-field ember-view input" name="token" autocomplete="off" spellcheck="false" type="password">
</div>
</div>
<!----> <button class="hds-button hds-button--color-primary hds-button--size-medium" id="auth-submit" type="submit">
<span class="hds-button__text"> Sign in </span>
</button>
<!---->
</form>
Text Content
SIGN IN TO VAULT Method Token Username LDAP Okta JWT OIDC RADIUS GitHub Token Sign in Contact your administrator for login credentials. * Vault * Upgrade to Vault Enterprise * Documentation * * Support * Terms * Privacy * Security * Accessibility © 2024 HashiCorp The Vault Web REPL provides an easy way to execute common Vault CLI commands, such as write, read, delete, and list. It does not include KV version 2 write or put commands. For guidance, type `help`. For more detailed documentation, see the HashiCorp Developer site. Examples: → Write secrets to kv v1: write <mount>/my-secret foo=bar → List kv v1 secret keys: list <mount>/ → Read a kv v1 secret: read <mount>/my-secret → Mount a kv v2 secret engine: write sys/mounts/<mount> type=kv options=version=2 → Read a kv v2 secret: kv-get <mount>/secret-path → Read a kv v2 secret's metadata: kv-get <mount>/secret-path -metadata