diff --git a/README.md b/README.md
new file mode 100644
index 0000000..31386d9
--- /dev/null
+++ b/README.md
@@ -0,0 +1,18 @@
+# Overview
+
+Vault secures, stores, and tightly controls access to tokens,
+passwords, certificates, API keys, and other secrets in modern
+computing. Vault handles leasing, key revocation, key rolling, and
+auditing. Through a unified API, users can access an encrypted
+Key/Value store and network encryption-as-a-service, or generate
+AWS IAM/STS credentials, SQL/NoSQL databases, X.509 certificates,
+SSH credentials, and more.
+
+## About the Charm
+
+This charm installs Vault from the Ubuntu Snap Store and
+supports the PostgreSQL storage backend only.
+
+After deploying and relating the charm to postgresql, install
+the vault snap locally and use "vault init" to create the
+master key shards and the root token, and store them safely.
diff --git a/copyright b/copyright
index 77cc3b6..a6441e1 100644
--- a/copyright
+++ b/copyright
@@ -1,3 +1,16 @@
-Copyright 2017 Canonical Ltd.
+Format: http://dep.debian.net/deps/dep5/
-License to be determined.
+Files: *
+Copyright: Copyright 2017, Canonical Ltd.
+License: GPL-3
+ This program is free software: you can redistribute it and/or modify
+ it under the terms of the GNU General Public License version 3, as
+ published by the Free Software Foundation.
+ .
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranties of
+ MERCHANTABILITY, SATISFACTORY QUALITY, or FITNESS FOR A PARTICULAR
+ PURPOSE. See the GNU General Public License for more details.
+ .
+ You should have received a copy of the GNU General Public License
+ along with this program. If not, see .
diff --git a/metadata.yaml b/metadata.yaml
index 003d544..c84f059 100644
--- a/metadata.yaml
+++ b/metadata.yaml
@@ -1,8 +1,18 @@
name: vault
maintainers:
- Paul Collins
-summary: a vault charm
-description: seriously, it's just a vault charm
+summary: a tool for managing secrets
+description: |
+ Vault secures, stores, and tightly controls access to
+ tokens, passwords, certificates, API keys, and other
+ secrets in modern computing. Vault handles leasing, key
+ revocation, key rolling, and auditing. Through a unified
+ API, users can access an encrypted Key/Value store and
+ network encryption-as-a-service, or generate AWS IAM/STS
+ credentials, SQL/NoSQL databases, X.509 certificates,
+ SSH credentials, and more.
+tags:
+ - security
requires:
db:
interface: pgsql