• Storage Backend
• Listener(s) and Port
• TLS certificate
• Seal Type
• Cluster Name
• Log Level
• UI
• Cluster IP and Port
What’s Configured in the File? What’s Not?
• Secrets Engines
• Authentication Methods
• Audit Devices
• Policies
• Entities & Groups