diff --git a/website/content/api-docs/secret/ldap.mdx b/website/content/api-docs/secret/ldap.mdx index a2e07d2081..dadb4e8f60 100644 --- a/website/content/api-docs/secret/ldap.mdx +++ b/website/content/api-docs/secret/ldap.mdx @@ -63,6 +63,9 @@ to search and change entry passwords in LDAP. - `client_tls_cert` `(string: )` - Client certificate to provide to the LDAP server, must be x509 PEM encoded. - `client_tls_key` `(string: )` - Client key to provide to the LDAP server, must be x509 PEM encoded. +- `skip_static_role_import_rotation` `(bool: false)` - The default value to use for `skip_import_rotation` when + creating static roles. This field can be overridden on an individual role level during [role creation](#static-roles). + See the [static roles section](#static-roles) for more detailed information and caveats. **Deprecated Parameters**: @@ -181,6 +184,10 @@ The `static-role` endpoint configures Vault to manage the passwords of existing - `rotation_period` `(string: )` - How often Vault should rotate the password of the user entry. Accepts [duration format strings](/vault/docs/concepts/duration-format). The minimum rotation period is 5 seconds.
**Example:** `"3600", "5s", "1h"` +- `skip_import_rotation` `(boolean: false)` - When set on a role creation request, Vault will not rotate the + pre-existing password of the associated LDAP entry. Note: This means that Vault will not be able to supply the + password to `GET` requests until the password is rotated (either automatically or manually by `rotate-role`). This + field overrides `skip_static_role_import_rotation` from the ldap config if both are set. ### Sample payload