docs: fix formatting in upgrade guide notes for oidc provider (#14678)

This commit is contained in:
Austin Gebauer 2022-03-24 10:09:03 -07:00 committed by GitHub
parent 4745091d52
commit 7f36a29e04
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -62,19 +62,19 @@ OIDC provider system to reduce configuration steps and enhance usability.
The following built-in resources are included in each Vault namespace starting with Vault The following built-in resources are included in each Vault namespace starting with Vault
1.10: 1.10:
- A "default" OIDC provider that's usable by all client applications - A `default` OIDC provider that's usable by all client applications
- A "default" key for signing and verification of ID tokens - A `default` key for signing and verification of ID tokens
- An "allow_all" assignment which authorizes all Vault entities to authenticate via a - An `allow_all` assignment which authorizes all Vault entities to authenticate via a
client application client application
If you created an [OIDC provider](/api-docs/secret/identity/oidc-provider#create-or-update-a-provider) If you created an [OIDC provider](/api-docs/secret/identity/oidc-provider#create-or-update-a-provider)
with the name "default", [key](/api-docs/secret/identity/tokens#create-a-named-key) with the with the name `default`, [key](/api-docs/secret/identity/tokens#create-a-named-key) with the
name "default", or [assignment](/api-docs/secret/identity/oidc-provider#create-or-update-an-assignment) name `default`, or [assignment](/api-docs/secret/identity/oidc-provider#create-or-update-an-assignment)
with the name "allow_all" using the Vault 1.9 tech preview, the installation of these built-in with the name `allow_all` using the Vault 1.9 tech preview, the installation of these built-in
resources will be skipped. We *strongly* recommend that you delete any resources that have resources will be skipped. We _strongly recommend_ that you delete any existing resources
naming collisions before upgrading to Vault 1.10. Failing to delete resources with naming that have naming collisions before upgrading to Vault 1.10. Failing to delete resources with
collisions could result unexpected default behavior. Additionally, we recommend reading the naming collisions could result unexpected default behavior. Additionally, we recommend reading
corresponding details in the OIDC provider [concepts](/docs/concepts/oidc-provider) document the corresponding details in the OIDC provider [concepts](/docs/concepts/oidc-provider) document
to understand how the built-in resources are used in the system. to understand how the built-in resources are used in the system.
## Known Issues ## Known Issues