From da6c84dc80b576054856054cd852e847601c43db Mon Sep 17 00:00:00 2001 From: nickfrei Date: Tue, 5 Aug 2025 09:11:15 -0500 Subject: [PATCH] Fix command path for rotating LDAP root credentials --- content/vault/v1.19.x/content/docs/auth/ldap.mdx | 2 +- content/vault/v1.20.x/content/docs/auth/ldap.mdx | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/content/vault/v1.19.x/content/docs/auth/ldap.mdx b/content/vault/v1.19.x/content/docs/auth/ldap.mdx index 4515412613..ce62d5162e 100644 --- a/content/vault/v1.19.x/content/docs/auth/ldap.mdx +++ b/content/vault/v1.19.x/content/docs/auth/ldap.mdx @@ -185,7 +185,7 @@ The root bindpass can be rotated to a Vault-generated value that is not accessib This will ensure that only Vault is able to access the "root" user that Vault uses to manipulate credentials. ```shell-session -vault write -f auth/ldap/rotate-root +vault write -f auth/ldap/config/rotate-root ``` ### Schedule-based root credential rotation diff --git a/content/vault/v1.20.x/content/docs/auth/ldap.mdx b/content/vault/v1.20.x/content/docs/auth/ldap.mdx index 1785e98ffa..5b17b0f671 100644 --- a/content/vault/v1.20.x/content/docs/auth/ldap.mdx +++ b/content/vault/v1.20.x/content/docs/auth/ldap.mdx @@ -195,7 +195,7 @@ The root bindpass can be rotated to a Vault-generated value that is not accessib This will ensure that only Vault is able to access the "root" user that Vault uses to manipulate credentials. ```shell-session -vault write -f auth/ldap/rotate-root +vault write -f auth/ldap/config/rotate-root ``` ### Schedule-based root credential rotation