Listing Secret Replicas
Learn how to view a list of a secret's replicas and see details including the destination region, destination vault, and encryption key of each replica.
To see complete details for a secret replica, use the instructions in Viewing a Secret's Details.
- On the Secrets list page, find the source secret that you want to work with and select the name of the secret to open the details page. If you need help finding the list page, see Listing Secrets.
- In the Secret Information tab, confirm that the Replication Role is "Source."
- In the Secret Information tab, select View replica details.
- The Replica Details panel displays a list of the secret's replicas, including the destination region, destination vault, destination vault OCID, encryption key name and encryption key OCID. If you need to copy the OCID of the destination vault, select the for the row listing the replica, then select Copy Destination Vault OCID. Note that the secret replica uses the same OCID as the source secret. This OCID is displayed on the Secret Information mentioned in step 2.
Use the oci vault secret get command to get information about the a secret and its replicas. Note that the secret replica uses the same OCID as the source secret. If you need to get the contents of a secret, see Getting a Secret's Contents.
oci vault secret get --secret-id <secret_OCID> [OPTIONS]
For example:
oci vault secret get --secret-id ocid1.vaultsecret.oc1.iad.exampleaz5qacpqahuecvbjqzql4qmpbrtd7pprafhivcfik6wuitexample
For a complete list of parameters and values for CLI commands, see the CLI Command Reference.
Use the GetSecret API with the Management Endpoint to get the details of a secret, including its replication configuration. If you need to get the contents of a secret, see Getting a Secret's Contents.
Note
The Management Endpoint is used for management operations including Create, Update, List, Get, and Delete. The Management Endpoint is also called the control plane URL or the KMSMANAGEMENT endpoint.
The Cryptographic Endpoint is used for cryptographic operations including Encrypt, Decrypt, Generate Data Encryption Key, Sign, and Verify. The Cryptographic Endpoint is also called the data plane URL or the KMSCRYPTO endpoint.
You can find the management and cryptographic endpoints in a vault's details metadata. See Getting a Vault's Details for instructions.
For regional endpoints for the Key Management, Secret Management, and Secret Retrieval APIs, see API Reference and Endpoints.