diff options
author | GitLab Bot <gitlab-bot@gitlab.com> | 2020-01-30 18:09:15 +0300 |
---|---|---|
committer | GitLab Bot <gitlab-bot@gitlab.com> | 2020-01-30 18:09:15 +0300 |
commit | 536aa3a1f4b96abc4ca34489bf2cbe503afcded7 (patch) | |
tree | 88d08f7dfa29a32d6526773c4fe0fefd9f2bc7d1 /doc/integration/vault.md | |
parent | 50ae4065530c4eafbeb7c5ff2c462c48c02947ca (diff) |
Add latest changes from gitlab-org/gitlab@master
Diffstat (limited to 'doc/integration/vault.md')
-rw-r--r-- | doc/integration/vault.md | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/doc/integration/vault.md b/doc/integration/vault.md index 8bd0897548a..ea3aeeb0f64 100644 --- a/doc/integration/vault.md +++ b/doc/integration/vault.md @@ -30,13 +30,13 @@ The following assumes you already have Vault installed and running. Open a terminal session and run the following command to enable the OpenID Connect authentication provider in Vault: - ```bash + ```shell vault auth enable oidc ``` You should see the following output in the terminal: - ```bash + ```shell Success! Enabled oidc auth method at: oidc/ ``` @@ -48,7 +48,7 @@ The following assumes you already have Vault installed and running. Replace `your_application_id` and `your_secret` in the example below with the application ID and secret generated for your app: - ```bash + ```shell $ vault write auth/oidc/config \ oidc_discovery_url="https://gitlab.com" \ oidc_client_id="your_application_id" \ @@ -59,7 +59,7 @@ The following assumes you already have Vault installed and running. You should see the following output in the terminal: - ```bash + ```shell Success! Data written to: auth/oidc/config ``` @@ -69,7 +69,7 @@ The following assumes you already have Vault installed and running. This configuration is saved under the name of the role you are creating. In this case, we are creating a `demo` role. Later, we'll show how you can access this role through the Vault CLI. - ```bash + ```shell vault write auth/oidc/role/demo \ user_claim="sub" \ allowed_redirect_uris="http://localhost:8250/oidc/callback,http://127.0.0.1:8200/ui/vault/auth/oidc/oidc/callback" \ @@ -96,7 +96,7 @@ The following assumes you already have Vault installed and running. After writing the same configurations from above, you can run the command below in your terminal to sign in with the role configuration created in step 4 above: - ```bash + ```shell vault login -method=oidc port=8250 role=demo ``` |