From 6108bd13760c34f21d0a87b30c56b34d41f79918 Mon Sep 17 00:00:00 2001 From: hc-github-team-secure-vault-core <82990506+hc-github-team-secure-vault-core@users.noreply.github.com> Date: Tue, 11 Apr 2023 15:02:06 -0400 Subject: [PATCH] backport of commit 45d960ff9173c56ebaada1afa4cfb66c1c01cd2c (#20095) Co-authored-by: Austin Gebauer <34121980+austingebauer@users.noreply.github.com> --- website/content/docs/auth/jwt/oidc-providers/azuread.mdx | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/website/content/docs/auth/jwt/oidc-providers/azuread.mdx b/website/content/docs/auth/jwt/oidc-providers/azuread.mdx index 1eab00b45a42..cb6f786fbd15 100644 --- a/website/content/docs/auth/jwt/oidc-providers/azuread.mdx +++ b/website/content/docs/auth/jwt/oidc-providers/azuread.mdx @@ -123,7 +123,7 @@ To set the proper permissions on the Azure app: 1. Add a permission 1. Select "Microsoft Graph" 1. Select "Delegated permissions" -1. Add the [User.Read](https://learn.microsoft.com/en-us/graph/permissions-reference#delegated-permissions-86) permission +1. Add the [User.Read](https://learn.microsoft.com/en-us/graph/permissions-reference#delegated-permissions-93) permission 1. Check the "Grant admin consent for Default Directory" checkbox Next, configure the OIDC auth method in Vault by setting `"provider_config"` to Azure.