0
0
Fork 0
mirror of https://github.com/dani-garcia/vaultwarden synced 2024-11-15 22:42:51 +01:00

Updated Enabling admin page (markdown)

Mathijs van Veluw 2024-05-01 13:33:07 +02:00
parent 1e556c91b6
commit 25646ecc16

@ -47,6 +47,8 @@ You can now hash the `ADMIN_TOKEN` using Argon2 by generating a [PHC string](htt
This can be generated by using a built-in `hash` command within Vaultwarden, or use the `argon2` CLI tool.
Within the vaultwarden application we have two presets, one using the [Bitwarden defaults](https://github.com/bitwarden/clients/blob/04d1fbb716bc7676c60a009906e183bb3cbb6047/libs/common/src/enums/kdfType.ts#L8-L10), and one using the [OWASP recommendations](https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html#argon2id).
[!WARNING] If you keep getting the message `You are using a plain text ADMIN_TOKEN which is insecure.`, then you either saved the settings via the admin interface already, and environment variables will not be used. Or you need to verify if you used the correct format. Carefully read the **How to prevent variable interpolation in `docker-compose.yml`** section below.
Some examples on how to generate an Argon2id PHC hash.
### Using `vaultwarden hash`