f885d97774
* VAULT-2285 adding capability to accept comma separated entries for auth enable/tune * Adding changelog * Adding logic to detect invalid input parameter for auth enable config * Updating tune.mdx * Updating secret enable/tune for comma separated parameters * Adding further parameter checks for auth/secret tests Fixing changelog using builtin type for a switch statement Fixing a possible panic scenario * Changing a function name, using deep.Equal instead of what reflect package provides * Fixing auth/secret enable/tune mdx files * One more mdx file fix * Only when users provide a single comma separated string in a curl command, split the entries by commas * Fixing API docs for auth/mount enable/tune for comma separated entries * updating docs, removing an unnecessary switch case
69 lines
2.5 KiB
Plaintext
69 lines
2.5 KiB
Plaintext
---
|
|
layout: docs
|
|
page_title: auth tune - Command
|
|
description: |-
|
|
The "auth tune" command tunes the configuration options for the auth method at
|
|
the given PATH.
|
|
---
|
|
|
|
# auth tune
|
|
|
|
The `auth tune` command tunes the configuration options for the auth method at
|
|
the given PATH. **The argument corresponds to the PATH where the auth method is
|
|
enabled, not the TYPE!**
|
|
|
|
## Examples
|
|
|
|
Tune the default lease for the auth method enabled at "github/":
|
|
|
|
```shell-session
|
|
$ vault auth tune -default-lease-ttl=72h github/
|
|
Success! Tuned the auth method at: github/
|
|
```
|
|
|
|
Specify multiple audit non-hmac request keys:
|
|
|
|
```shell-session
|
|
$ vault auth tune -audit-non-hmac-request-keys=value1 -audit-non-hmac-request-keys=value2 github/
|
|
```
|
|
|
|
## Usage
|
|
|
|
The following flags are available in addition to the [standard set of
|
|
flags](/docs/commands) included on all commands.
|
|
|
|
- `-allowed-response-headers` `(string: "")` - response header values that the auth
|
|
method will be allowed to set.
|
|
|
|
- `-audit-non-hmac-request-keys` `(string: "")` - Key that will not be HMAC'd
|
|
by audit devices in the request data object. Note that multiple keys may be
|
|
specified by providing this option multiple times, each time with 1 key.
|
|
|
|
- `-audit-non-hmac-response-keys` `(string: "")` - Key that will not be HMAC'd
|
|
by audit devices in the response data object. Note that multiple keys may be
|
|
specified by providing this option multiple times, each time with 1 key.
|
|
|
|
- `-default-lease-ttl` `(duration: "")` - The default lease TTL for this auth
|
|
method. If unspecified, this defaults to the Vault server's globally
|
|
configured default lease TTL, or a previously configured value for the auth
|
|
method.
|
|
|
|
- `-description` `(string: "")` - Specifies the description of the auth method.
|
|
This overrides the current stored value, if any.
|
|
|
|
- `-listing-visibility` `(string: "")` - The flag to toggle whether to show the
|
|
mount in the UI-specific listing endpoint.
|
|
|
|
- `-max-lease-ttl` `(duration: "")` - The maximum lease TTL for this auth
|
|
method. If unspecified, this defaults to the Vault server's globally
|
|
configured maximum lease TTL, or a previously configured value for the auth
|
|
method.
|
|
|
|
- `-passthrough-request-headers` `(string: "")` - request header values that will
|
|
be sent to the auth method. Note that multiple keys may be
|
|
specified by providing this option multiple times, each time with 1 key.
|
|
|
|
- `-token-type` `(string: "")` - Specifies the type of tokens that should be
|
|
returned by the auth method. Note that multiple keys may be
|
|
specified by providing this option multiple times, each time with 1 key.
|