From b3254ea143b74071b285e55f3b7a6d3b18c0eb7b Mon Sep 17 00:00:00 2001 From: Austin Gebauer <34121980+austingebauer@users.noreply.github.com> Date: Tue, 11 Apr 2023 18:34:38 +0000 Subject: [PATCH] backport of commit 45d960ff9173c56ebaada1afa4cfb66c1c01cd2c --- website/content/docs/auth/jwt/oidc-providers/azuread.mdx | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/website/content/docs/auth/jwt/oidc-providers/azuread.mdx b/website/content/docs/auth/jwt/oidc-providers/azuread.mdx index 1eab00b45a42..cb6f786fbd15 100644 --- a/website/content/docs/auth/jwt/oidc-providers/azuread.mdx +++ b/website/content/docs/auth/jwt/oidc-providers/azuread.mdx @@ -123,7 +123,7 @@ To set the proper permissions on the Azure app: 1. Add a permission 1. Select "Microsoft Graph" 1. Select "Delegated permissions" -1. Add the [User.Read](https://learn.microsoft.com/en-us/graph/permissions-reference#delegated-permissions-86) permission +1. Add the [User.Read](https://learn.microsoft.com/en-us/graph/permissions-reference#delegated-permissions-93) permission 1. Check the "Grant admin consent for Default Directory" checkbox Next, configure the OIDC auth method in Vault by setting `"provider_config"` to Azure.