* Adds an option to enable sAMAccountname logins when upndomain is set
* Adds an option to enable sAMAccountname logins when upndomain is set
* Updated changelog entry
* Update 29118.txt
* Updated cap/ldap version due to needed dependency
* Updated cap/ldap version due to needed dependency
* Restart CI
* Updated LDAP api-docs and docs describing the enable_samaccountname_login option
* Added missing comma in config_test.go
* Update enables_samaccountname
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
* Update enable_samaccountname_login feature documentation
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
---------
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
* clarify subkey read in GUI
* add screenshots
* add to index
* update kv nav steps
* update alt text for screenshot
* update steps
* edits
* fix build error and simplify path structure
* fix paths
* missed one
* missed another one >_<
* Update website/content/docs/secrets/kv/kv-v2/cookbook/write-data.mdx
---------
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
* Content conversion from tutorial to doc - seal
* Add AppRole best practices
* Clean up the reference list
* Updated the title
* match the titles
* Add namespaces best practices
* Update the table style
* Update azure.mdx
Update Azure secrets engine docs to use AZURE_SDK_GO_LOGGING for Azure debug
* Update azure.mdx
Update Azure Auth engine docs to use AZURE_SDK_GO_LOGGING for Azure debug
removing these recommendations because they are not inline with conventional wisdom or our HVDs. For example, AppRole should not be leverage when a platform native identity source is available (e.g. AWS, Azure, GCP, K8s, Nomad, etc...)
Corrected Docs at: [vault/docs/auth/approle **Via the CLI**](https://developer.hashicorp.com/vault/docs/auth/approle#via-the-cli-1) which results in the error message below on versions near to Vault 1.17.x.
```
Error writing data to auth/approle/role/my-role: Error making API request.
URL: PUT https://.../v1/auth/approle/role/my-role
Code: 400. Errors:
* 'token_type' cannot be 'batch' or 'default_batch' when set to generate tokens with limited use count
```
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
* docs: correct auth jwt role requirements
* remove upgrade guide to be added in separate PR
* Revert "remove upgrade guide to be added in separate PR"
This reverts commit 6554d3ff63623a329b0d93f7143d95cd3f19b3e6.
* update required details for bound audience
* Apply suggestions from code review
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
* fix formatting to match the existing format of the file
* add 1.16 known issues
* add 1.17 upgrade guide note
---------
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
* Replace 'HCP Vault' with 'HCP Vault Dedicated'
* Replace 'HCP Vault' with 'HCP Vault Dedicated' where applicable
* Replace 'Terraform Cloud' with 'HCP Terraform'
* Minor format fixes
* Update the side-nav title to 'HCP Terraform'
* Undo changes to Terraform Cloud secrets engine
* allows use of pre-hashed passwords with userpass backend
* Remove unneeded error
* Single error check after switch
* use param name quoted in error message
* updated test for quoted param in error
* white space fixes for markdown doc
* More whitespace fixes
* added changelog
* Password/pre-hashed password are only required on 'create' operation
* docs indentation
* Update website/content/docs/auth/userpass.mdx
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
* Updated docs
* Check length of hash too
* Update builtin/credential/userpass/path_user_password_test.go
:)
Co-authored-by: Kuba Wieczorek <kuba.wieczorek@hashicorp.com>
---------
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
Co-authored-by: Kuba Wieczorek <kuba.wieczorek@hashicorp.com>
* add adfs link
* add adfs and update index
add the adfs link in the index.mdx
add the file adfs.mdx
* Update docs-nav-data.json
Add the link to ADFS documentation
* add adfs-oidc-ldapgroupoption.png
image for the documentation adfs.mdx
* Update docs-nav-data.json
Updated from the last version of the file and adding adfs link
* suggested edits
* Update the file adfs.mdx
* Update adfs.mdx
Change auth/adfs/config to auth/<YOUR_OIDC_MOUNT_PATH>/config
* Update website/content/docs/auth/jwt/oidc-providers/adfs.mdx
* Corrected typo adfs.mdx
We had 2x step3 so I changed to have step 3 and step 4
---------
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
Co-authored-by: Yoko Hyakuna <yoko@hashicorp.com>
* add docs for configuring jwt validation pubkeys for vso and update jwt auth docs to mention key rotation
Co-authored-by: Tom Proctor <tomhjp@users.noreply.github.com>