--- layout: docs page_title: auth list - Command description: |- The "auth list" command lists the auth methods enabled. The output lists the enabled auth methods and options for those methods. --- # auth list The `auth list` command lists the auth methods enabled. The output lists the enabled auth methods and options for those methods. ## Deprecation Status Column As of 1.12, all builtin auth engines will have an associated Deprecation Status. This status will be reflected in the `Deprecation Status` column, seen below. All auth engines which are not provided by builtin plugins will show a `Deprecation Status` of "n/a". ## Examples List all auth methods: ```shell-session $ vault auth list Path Type Description ---- ---- ----------- token/ token token based credentials userpass/ userpass n/a ``` List detailed auth method information: ```shell-session $ vault auth list -detailed Path Plugin Accessor Default TTL Max TTL Token Type Replication Seal Wrap External Entropy Access Options Description UUID Deprecation Status ---- ------ -------- ----------- ------- ---------- ----------- --------- ----------------------- ------- ----------- ---- ------------------ app-id/ app-id auth_app-id_c88ad56f system system default-service replicated false false map[] n/a a7c702b4-0dba-02b6-483c-2fd6be33240a pending removal approle/ approle auth_approle_95df932e system system default-service replicated false false map[] n/a 931df9d1-8737-b7dc-4ca2-3e0e892fce92 supported token/ token auth_token_aafab997 system system default-service replicated false false map[] token based credentials 6eb5db7b-ac7f-4304-1f52-9b802c6f06c1 n/a ``` ## Usage The following flags are available in addition to the [standard set of flags](/docs/commands) included on all commands. ### Output Options - `-format` `(string: "table")` - Print the output in the given format. Valid formats are "table", "json", or "yaml". This can also be specified via the `VAULT_FORMAT` environment variable. ### Command Options - `-detailed` `(bool: false)` - Print detailed information such as configuration and replication status about each auth method.