From c4e73cffa3b34e23acd34cd99351d546bfe69213 Mon Sep 17 00:00:00 2001 From: Sebastian Gumprich Date: Fri, 8 Nov 2019 20:56:02 +0100 Subject: [PATCH] update oidc azure docs to make it readable (#7832) --- website/source/docs/auth/jwt_oidc_providers.html.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/website/source/docs/auth/jwt_oidc_providers.html.md b/website/source/docs/auth/jwt_oidc_providers.html.md index 2ba7190fc4..adc09add69 100644 --- a/website/source/docs/auth/jwt_oidc_providers.html.md +++ b/website/source/docs/auth/jwt_oidc_providers.html.md @@ -48,10 +48,12 @@ to the jwt token and `groups_claim` should be set to `groups`. ### CLI setup instructions: You have to fill in the following values make sure to use the correct vault secret path that matches the name of the authentication method such as /oidc/ + * oidc_client_id = Application Client ID * oidc_client_secret = Secret obtained from the Certificates & Secrets Section * default_role = default role the user will be using when connecting. (see the second command) - * oidc_discovery_url = Open ID endpoint retrieved from the App Registration wections. + * oidc_discovery_url = Open ID endpoint retrieved from the App Registration sections. + ``` vault write auth/oidc/config \ oidc_client_id="your_client_id" \