~ $ vault auth -method=okta username=giel.dbPassword (will be hidden):Error making API request.
Code: 400. Errors:
* Okta auth failed: Post https://.okta.com/api/v1/authn: dial tcp: lookup .okta.com: no such host~ $ vault write auth/okta/config base_url="okta.com" org_name="mycompany" api_token="xxx"Success! Data written to: auth/okta/config~ $ vault read auth/okta/configKey Value--- -----BaseURL okta.comOrg n/a$ vault write auth/okta/config base_url="okta.com" organization="<our-company>" token="?????"
$ vault login -method=okta username=<myID>
Password (will be hidden):
Error authenticating: Error making API request.
URL: PUT https://<ourvaulturl>v1/auth/okta/login/<myID>
Code: 400. Errors:
* Okta auth failed: HTTP Method: POST - URL: https://<our_company>.okta.com/api/v1/authn: - HTTP Status Code: 401, OKTA Error Code: E0000011, OKTA Error Summary: Invalid token provided, OKTA Error Causes: []
organization="dev-123456" \
token="00KzlTNCqDf0enpQKYSAYUt88KHqXax6dT11xEZz_g"$ : vault write auth/okta/config token=''
Success! Data written to: auth/okta/config
$ : vault login -method=okta username=<My_OKTA_ID>
Password (will be hidden):
WARNING! The VAULT_TOKEN environment variable is set! This takes precedence
over the value set by this command. To use the value set by this command,
unset the VAULT_TOKEN environment variable or set it to the token displayed
below.
Success! You are now authenticated. The token information displayed below
is already stored in the token helper. You do NOT need to run "vault login"
again. Future Vault requests will automatically use this token.
Key Value
--- -----
token <token>
token_accessor <accessor>
token_duration 768h
token_renewable true
token_policies ["default"]
identity_policies []
policies ["default"]
token_meta_policies n/a
token_meta_username <My_OKTA_ID>