mirror of
https://github.com/dani-garcia/vaultwarden
synced 2024-11-15 22:42:51 +01:00
Updated Enabling admin page (markdown)
parent
1e556c91b6
commit
25646ecc16
1 changed files with 2 additions and 0 deletions
|
@ -47,6 +47,8 @@ You can now hash the `ADMIN_TOKEN` using Argon2 by generating a [PHC string](htt
|
|||
This can be generated by using a built-in `hash` command within Vaultwarden, or use the `argon2` CLI tool.
|
||||
Within the vaultwarden application we have two presets, one using the [Bitwarden defaults](https://github.com/bitwarden/clients/blob/04d1fbb716bc7676c60a009906e183bb3cbb6047/libs/common/src/enums/kdfType.ts#L8-L10), and one using the [OWASP recommendations](https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html#argon2id).
|
||||
|
||||
[!WARNING] If you keep getting the message `You are using a plain text ADMIN_TOKEN which is insecure.`, then you either saved the settings via the admin interface already, and environment variables will not be used. Or you need to verify if you used the correct format. Carefully read the **How to prevent variable interpolation in `docker-compose.yml`** section below.
|
||||
|
||||
Some examples on how to generate an Argon2id PHC hash.
|
||||
|
||||
### Using `vaultwarden hash`
|
||||
|
|
Loading…
Reference in a new issue