From cefda90d8ed4309d41a151903693df7b0189433a Mon Sep 17 00:00:00 2001 From: Lukas <73201928+cz3k@users.noreply.github.com> Date: Wed, 15 May 2024 16:46:09 +0200 Subject: [PATCH] Fix warning block quote --- Enabling-admin-page.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/Enabling-admin-page.md b/Enabling-admin-page.md index 20e6308..c152ab4 100644 --- a/Enabling-admin-page.md +++ b/Enabling-admin-page.md @@ -47,7 +47,8 @@ You can now hash the `ADMIN_TOKEN` using Argon2 by generating a [PHC string](htt This can be generated by using a built-in `hash` command within Vaultwarden, or use the `argon2` CLI tool. Within the vaultwarden application we have two presets, one using the [Bitwarden defaults](https://github.com/bitwarden/clients/blob/04d1fbb716bc7676c60a009906e183bb3cbb6047/libs/common/src/enums/kdfType.ts#L8-L10), and one using the [OWASP recommendations](https://cheatsheetseries.owasp.org/cheatsheets/Password_Storage_Cheat_Sheet.html#argon2id). -[!WARNING] If you keep getting the message `You are using a plain text ADMIN_TOKEN which is insecure.`, then you either saved the settings via the admin interface already, and environment variables will not be used. Or you need to verify if you used the correct format. Carefully read the **How to prevent variable interpolation in `docker-compose.yml`** section below. +> [!WARNING] +> If you keep getting the message `You are using a plain text ADMIN_TOKEN which is insecure.`, then you either saved the settings via the admin interface already, and environment variables will not be used. Or you need to verify if you used the correct format. Carefully read the **How to prevent variable interpolation in `docker-compose.yml`** section below. Some examples on how to generate an Argon2id PHC hash.