From 9384d8ba69bbdd533bbceeafc47e236f54d21a7c Mon Sep 17 00:00:00 2001 From: Jim Kalafut Date: Tue, 19 Nov 2019 13:52:19 -0800 Subject: [PATCH] Update JWT docs (#7884) --- website/source/docs/auth/jwt.html.md | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/website/source/docs/auth/jwt.html.md b/website/source/docs/auth/jwt.html.md index b57487eec..bc32b9c5d 100644 --- a/website/source/docs/auth/jwt.html.md +++ b/website/source/docs/auth/jwt.html.md @@ -160,8 +160,7 @@ they must be added as query parameters, for example: ### OIDC Login (CLI) The CLI login defaults to path of `/oidc`. If this auth method was enabled at a -different path, specify `-path=/my-path` in the CLI. The default local listening port is 8250. This -can be changed with the `port` option. +different path, specify `-path=/my-path` in the CLI. ```text $ vault login -method=oidc port=8400 role=test @@ -174,6 +173,11 @@ Complete the login via your OIDC provider. Launching browser to: The browser will open to the generated URL to complete the provider's login. The URL may be entered manually if the browser cannot be automatically opened. +The callback listener may be customized with the following optional parameters: + +* `callbackhost` (default: "localhost") +* `port` (default: 8250) + ### OIDC Provider Configuration The OIDC authentication flow has been successfully tested with a number of providers. A full