You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Vault
Hi,
I don't fully understand how this should work. My Vault instance is running in AWS (like the rest of environment). What I'd like to achieve are Vault users authenticated using Azure AD without creating them with userpass method. So each user could login to Vault using his token obtained from Azure AD. Is it possible to configure it in that way? I can't find any example. How Vault Agent config would look like in this case?
brgds,
Michel Vocks
unread,
Sep 9, 2019, 9:26:20 AM9/9/19
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
So in the UI I am trying to log in using OIDC, then it is open a Office365 window with information: "Signing in with your OIDC provider..." and fall back to main Vault window saying:
Error claim "user" not found in token.
Jim Kalafut
unread,
Sep 9, 2019, 12:46:07 PM9/9/19
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
You can enable the "verbose_oidc_logging" for the role during configuration to help troubleshoot the setup. This will log the received ID token so you can see what Vault is trying to process. Be sure to disable this setting prior to deploying to production.