From 2efaf5272c28e93bd28f097c6f2dd28908a8e659 Mon Sep 17 00:00:00 2001 From: Jeff Mitchell Date: Thu, 31 Mar 2016 18:07:43 -0400 Subject: [PATCH] Documentation update --- website/source/docs/auth/token.html.md | 38 ++------------------------ 1 file changed, 2 insertions(+), 36 deletions(-) diff --git a/website/source/docs/auth/token.html.md b/website/source/docs/auth/token.html.md index 1bc488e4c..fc8e4fe96 100644 --- a/website/source/docs/auth/token.html.md +++ b/website/source/docs/auth/token.html.md @@ -459,40 +459,6 @@ of the header should be "X-Vault-Token" and the value should be the token. -### /auth/token/revoke-prefix[/prefix] -#### POST - -
-
Description
-
- Revokes all tokens generated at a given prefix, along with child tokens, - and all secrets generated using those tokens. Uses include revoking all - tokens generated by a credential backend during a suspected compromise. - This is a root-protected endpoint. -
- -
Method
-
POST
- -
URL
-
`/auth/token/revoke-prefix`
- -
Parameters
-
-
    -
  • - token - required - Token source prefix to revoke. This can be part of the URL or the body. -
  • -
-
- -
Returns
-
`204` response code. -
-
- ### /auth/token/roles/[role_name] #### DELETE @@ -599,7 +565,7 @@ of the header should be "X-Vault-Token" and the value should be the token. available or would require `sudo`/root privileges to access. Role parameters, when set, override any provided options to the `create` endpoints. The role name is also included in the token path, allowing all - tokens created against a role to be revoked using the `revoke-prefix` + tokens created against a role to be revoked using the `sys/revoke-prefix` endpoint. @@ -645,7 +611,7 @@ of the header should be "X-Vault-Token" and the value should be the token. revoking all tokens created against it before some point in time. The suffix can be changed, allowing new callers to have the new suffix as part of their path, and then tokens with the old suffix can be revoked - via `revoke-prefix`. + via `sys/revoke-prefix`.