Vault
Userpass auth method (HTTP API)
This is the API documentation for the Vault Username & Password auth method. For general information about the usage and operation of the Username and Password method, please see the Vault Userpass method documentation.
This documentation assumes the Username & Password method is mounted at the /auth/userpass
path in Vault. Since it is possible to enable auth methods at any location,
please update your API calls accordingly.
Create/Update user
Create a new user or update an existing user. This path honors the distinction between the create and update capabilities inside ACL policies.
| Method | Path | 
|---|---|
| POST | /auth/userpass/users/:username | 
Parameters
- username- (string: <required>)– The username for the user. Accepted characters: alphanumeric plus "_", "-", "." (underscore, hyphen and period); username cannot begin with a hyphen, nor can it begin or end with a period.
- password- (string: <required>)- The password for the user. Only required when creating the user.
- token_ttl- (integer: 0 or string: "")- The incremental lifetime for generated tokens. This current value of this will be referenced at renewal time.
- token_max_ttl- (integer: 0 or string: "")- The maximum lifetime for generated tokens. This current value of this will be referenced at renewal time.
- token_policies- (array: [] or comma-delimited string: "")- List of token policies to encode onto generated tokens. Depending on the auth method, this list may be supplemented by user/group/other values.
- policies- (array: [] or comma-delimited string: "")- List of token policies to encode onto generated tokens. Depending on the auth method, this list may be supplemented by user/group/other values.
- token_bound_cidrs- (array: [] or comma-delimited string: "")- List of CIDR blocks; if set, specifies blocks of IP addresses which can authenticate successfully, and ties the resulting token to these blocks as well.
- token_explicit_max_ttl- (integer: 0 or string: "")- If set, will encode an explicit max TTL onto the token. This is a hard cap even if- token_ttland- token_max_ttlwould otherwise allow a renewal.
- token_no_default_policy- (bool: false)- If set, the- defaultpolicy will not be set on generated tokens; otherwise it will be added to the policies set in- token_policies.
- token_num_uses- (integer: 0)- The maximum number of times a generated token may be used (within its lifetime); 0 means unlimited. If you require the token to have the ability to create child tokens, you will need to set this value to 0.
- token_period- (integer: 0 or string: "")- The period, if any, to set on the token.
- token_type- (string: "")- The type of token that should be generated. Can be- service,- batch, or- defaultto use the mount's tuned default (which unless changed will be- servicetokens). For token store roles, there are two additional possibilities:- default-serviceand- default-batchwhich specify the type to return unless the client requests a different type at generation time.
Sample payload
{
  "password": "superSecretPassword",
  "token_policies": ["admin", "default"],
  "token_bound_cidrs": ["127.0.0.1/32", "128.252.0.0/16"]
}
Sample request
$ curl \
    --header "X-Vault-Token: ..." \
    --request POST \
    --data @payload.json \
    http://127.0.0.1:8200/v1/auth/userpass/users/mitchellh
Read user
Reads the properties of an existing username.
| Method | Path | 
|---|---|
| GET | /auth/userpass/users/:username | 
Sample request
$ curl \
    --header "X-Vault-Token: ..." \
    http://127.0.0.1:8200/v1/auth/userpass/users/mitchellh
Sample response
{
  "request_id": "0ad1be52-9398-4b3c-f58b-98e427406471",
  "lease_id": "",
  "renewable": false,
  "lease_duration": 0,
  "data": {
    "token_bound_cidrs": [
      "127.0.0.1",
      "128.252.0.0/16"
    ],
    "token_explicit_max_ttl": 0,
    "token_max_ttl": 0,
    "token_no_default_policy": false,
    "token_num_uses": 0,
    "token_period": 0,
    "token_policies": [
      "admin",
      "default"
    ],
    "token_ttl": 0,
    "token_type": "default"
  },
  "wrap_info": null,
  "warnings": null,
  "auth": null
}
Delete user
This endpoint deletes the user from the method.
| Method | Path | 
|---|---|
| DELETE | /auth/userpass/users/:username | 
Parameters
- username- (string: <required>)- The username for the user.
Sample request
$ curl \
    --header "X-Vault-Token: ..." \
    --request DELETE \
    http://127.0.0.1:8200/v1/auth/userpass/users/mitchellh
Update password on user
Update password for an existing user.
| Method | Path | 
|---|---|
| POST | /auth/userpass/users/:username/password | 
Parameters
- username- (string: <required>)– The username for the user.
- password- (string: <required>)- The password for the user.
Sample payload
{
  "password": "superSecretPassword2"
}
Sample request
$ curl \
    --header "X-Vault-Token: ..." \
    --request POST \
    --data @payload.json \
    http://127.0.0.1:8200/v1/auth/userpass/users/mitchellh/password
Update policies on user
Update policies for an existing user.
| Method | Path | 
|---|---|
| POST | /auth/userpass/users/:username/policies | 
Parameters
- username- (string: <required>)– The username for the user.
- token_policies- (array: [] or comma-delimited string: "")- List of policies to encode onto generated tokens. Depending on the auth method, this list may be supplemented by user/group/other values.
Sample payload
{
  "token_policies": ["policy1", "policy2"]
}
Sample request
$ curl \
    --header "X-Vault-Token: ..." \
    --request POST \
    --data @payload.json \
    http://127.0.0.1:8200/v1/auth/userpass/users/mitchellh/policies
List users
List available userpass users.
| Method | Path | 
|---|---|
| LIST | /auth/userpass/users | 
Sample request
$ curl \
    --header "X-Vault-Token: ..." \
    --request LIST \
    http://127.0.0.1:8200/v1/auth/userpass/users
Sample response
{
  "data": {
    "keys": ["mitchellh", "armon"]
  }
}
Login
Login with the username and password.
| Method | Path | 
|---|---|
| POST | /auth/userpass/login/:username | 
Parameters
- username- (string: <required>)– The username for the user.
- password- (string: <required>)- The password for the user.
Sample payload
{
  "password": "superSecretPassword2"
}
Sample request
$ curl \
    --request POST \
    --data @payload.json \
    http://127.0.0.1:8200/v1/auth/userpass/login/mitchellh
Sample response
{
  "request_id": "ae1882ba-f60a-7629-ce1a-6618c482de3e",
  "lease_id": "",
  "renewable": false,
  "lease_duration": 0,
  "data": null,
  "wrap_info": null,
  "warnings": null,
  "auth": {
    "client_token": "hvs.CAESIJyeFmhLYRWVXPJStT3fDP1ZdFkon_otuk1sJUpkfk_WGh4KHGh2cy5xdW9XVHBnVUwwbzB1ZEhzZkpkRmVoU08",
    "accessor": "iP2Lw1JXpjlALbgJSeIx51n7",
    "policies": [
      "default",
      "policy1",
      "policy2"
    ],
    "token_policies": [
      "default",
      "policy1",
      "policy2"
    ],
    "metadata": {
      "username": "mitchellh"
    },
    "lease_duration": 2764800,
    "renewable": true,
    "entity_id": "0660dce5-4f2c-926a-8b15-158901557d9d",
    "token_type": "service",
    "orphan": true,
    "mfa_requirement": null,
    "num_uses": 0
  }
}