diff --git a/website/content/docs/internals/architecture.mdx b/website/content/docs/internals/architecture.mdx index 4250e3110187..99ff94781775 100644 --- a/website/content/docs/internals/architecture.mdx +++ b/website/content/docs/internals/architecture.mdx @@ -45,7 +45,7 @@ key. [![Vault Shamir Secret Sharing Algorithm](/img/vault-shamir-secret-sharing.svg)](/img/vault-shamir-secret-sharing.svg) The number of shares and the minimum threshold required can both be specified. -Shamir's technique can be disabled, and the master key used directly for +Shamir's technique can be disabled, and the master key can be used directly for unsealing. Once Vault retrieves the encryption key, it is able to decrypt the data in the storage backend, and enters the _unsealed_ state. Once unsealed, Vault loads all of the configured audit devices, auth methods, and secrets