Skip to content

Commit 4e439e0

Browse files
backport of commit 1d61aeb (#23249)
Co-authored-by: Sergey Kutovoy <[email protected]>
1 parent 565427a commit 4e439e0

File tree

2 files changed

+20
-17
lines changed

2 files changed

+20
-17
lines changed

changelog/23225.txt

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
```release-note:bug
2+
docs: fix wrong api path for ldap secrets cli-commands
3+
```

website/content/docs/secrets/ldap.mdx

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ The secrets engine has three primary features:
3434
to generate passwords:
3535

3636
```sh
37-
$ vault write auth/ldap/config \
37+
$ vault write ldap/config \
3838
binddn=$USERNAME \
3939
bindpass=$PASSWORD \
4040
url=ldaps://138.91.247.105
@@ -45,7 +45,7 @@ The secrets engine has three primary features:
4545
3. Rotate the root password so only Vault knows the credentials:
4646

4747
```sh
48-
$ vault write -f auth/ldap/rotate-root
48+
$ vault write -f ldap/rotate-root
4949
```
5050

5151
Note: it's not possible to retrieve the generated password once rotated by Vault.
@@ -80,7 +80,7 @@ Generated passwords must be 8 characters or less to support RACF. The length of
8080
password can be configured using a [password policy](/vault/docs/concepts/password-policies):
8181

8282
```bash
83-
$ vault write auth/ldap/config \
83+
$ vault write ldap/config \
8484
binddn=$USERNAME \
8585
bindpass=$PASSWORD \
8686
url=ldaps://138.91.247.105 \
@@ -94,7 +94,7 @@ For managing Active Directory instances, the secret engine must be configured to
9494
schema `ad`.
9595

9696
```bash
97-
$ vault write auth/ldap/config \
97+
$ vault write ldap/config \
9898
binddn=$USERNAME \
9999
bindpass=$PASSWORD \
100100
url=ldaps://138.91.247.105 \
@@ -109,7 +109,7 @@ $ vault write auth/ldap/config \
109109
Password rotation settings will be managed by this role.
110110

111111
```sh
112-
$ vault write auth/ldap/static-role/hashicorp \
112+
$ vault write ldap/static-role/hashicorp \
113113
dn='uid=hashicorp,ou=users,dc=hashicorp,dc=com' \
114114
username='hashicorp' \
115115
rotation_period="24h"
@@ -118,7 +118,7 @@ $ vault write auth/ldap/config \
118118
2. Request credentials for the "hashicorp" role:
119119

120120
```sh
121-
$ vault read auth/ldap/static-cred/hashicorp
121+
$ vault read ldap/static-cred/hashicorp
122122
```
123123

124124
### Password rotation
@@ -155,7 +155,7 @@ rotated prior to deleting the role or revoking access to the static role.
155155
Dynamic credentials can be configured by calling the `/role/:role_name` endpoint:
156156

157157
```bash
158-
$ vault write auth/ldap/role/dynamic-role \
158+
$ vault write ldap/role/dynamic-role \
159159
creation_ldif=@/path/to/creation.ldif \
160160
deletion_ldif=@/path/to/deletion.ldif \
161161
rollback_ldif=@/path/to/rollback.ldif \
@@ -169,7 +169,7 @@ executed if the creation fails for any reason. This ensures any entities are rem
169169
To generate credentials:
170170

171171
```bash
172-
$ vault read auth/ldap/creds/dynamic-role
172+
$ vault read ldap/creds/dynamic-role
173173
Key Value
174174
--- -----
175175
lease_id ldap/creds/dynamic-role/HFgd6uKaDomVMvJpYbn9q4q5
@@ -283,7 +283,7 @@ to an AD server.
283283
$ vault secrets enable ldap
284284
Success! Enabled the ad secrets engine at: ldap/
285285
286-
$ vault write auth/ldap/config \
286+
$ vault write ldap/config \
287287
binddn=$USERNAME \
288288
bindpass=$PASSWORD \
289289
url=ldaps://138.91.247.105 \
@@ -293,7 +293,7 @@ $ vault write auth/ldap/config \
293293
Our next step is to designate a set of service accounts for check-out.
294294

295295
```shell-session
296-
$ vault write auth/ldap/library/accounting-team \
296+
$ vault write ldap/library/accounting-team \
297297
298298
ttl=10h \
299299
max_ttl=20h \
@@ -312,7 +312,7 @@ When a library of service accounts has been created, view their status at any ti
312312
available or checked out.
313313

314314
```shell-session
315-
$ vault read auth/ldap/library/accounting-team/status
315+
$ vault read ldap/library/accounting-team/status
316316
Key Value
317317
--- -----
318318
[email protected] map[available:true]
@@ -322,7 +322,7 @@ [email protected] map[available:true]
322322
To check out any service account that's available, simply execute:
323323

324324
```shell-session
325-
$ vault write -f auth/ldap/library/accounting-team/check-out
325+
$ vault write -f ldap/library/accounting-team/check-out
326326
Key Value
327327
--- -----
328328
lease_id ldap/library/accounting-team/check-out/EpuS8cX7uEsDzOwW9kkKOyGW
@@ -336,7 +336,7 @@ If the default `ttl` for the check-out is higher than needed, set the check-out
336336
for a shorter time by using:
337337

338338
```shell-session
339-
$ vault write auth/ldap/library/accounting-team/check-out ttl=30m
339+
$ vault write ldap/library/accounting-team/check-out ttl=30m
340340
Key Value
341341
--- -----
342342
lease_id ldap/library/accounting-team/check-out/gMonJ2jB6kYs6d3Vw37WFDCY
@@ -353,7 +353,7 @@ check it back in."
353353
If no service accounts are available for check-out, Vault will return a 400 Bad Request.
354354

355355
```shell-session
356-
$ vault write -f auth/ldap/library/accounting-team/check-out
356+
$ vault write -f ldap/library/accounting-team/check-out
357357
Error writing data to ldap/library/accounting-team/check-out: Error making API request.
358358
359359
URL: POST http://localhost:8200/v1/ldap/library/accounting-team/check-out
@@ -380,7 +380,7 @@ ends.
380380
To check a service account back in for others to use, call:
381381

382382
```shell-session
383-
$ vault write -f auth/ldap/library/accounting-team/check-in
383+
$ vault write -f ldap/library/accounting-team/check-in
384384
Key Value
385385
--- -----
386386
check_ins [[email protected]]
@@ -390,7 +390,7 @@ Most of the time this will just work, but if multiple service accounts are check
390390
caller, Vault will need to know which one(s) to check in.
391391

392392
```shell-session
393-
$ vault write auth/ldap/library/accounting-team/check-in [email protected]
393+
$ vault write ldap/library/accounting-team/check-in [email protected]
394394
Key Value
395395
--- -----
396396
check_ins [[email protected]]
@@ -405,7 +405,7 @@ Vault will check it back in automatically when the `ttl` expires. However, if th
405405
service accounts can be forcibly checked in by a highly privileged user through:
406406

407407
```shell-session
408-
$ vault write -f auth/ldap/library/manage/accounting-team/check-in
408+
$ vault write -f ldap/library/manage/accounting-team/check-in
409409
Key Value
410410
--- -----
411411
check_ins [[email protected]]

0 commit comments

Comments
 (0)