/sys/locked-users
The /sys/locked-users
endpoint is used to list and unlock locked users in Vault.
Please visit user lockout concepts page for more details about the feature.
List locked users
This endpoint lists the locked users information in Vault.
The response will include all child namespaces of the namespace in which the request was made. If some namespace has subsequently been deleted, its path will be listed as "deleted namespace :ID:." Deleted namespaces are reported only for queries in the root namespace because the information about the namespace path is unknown. The response will be returned in the decreasing order of locked user counts.
This endpoint was added in Vault 1.13.
Method | Path |
---|---|
GET | /sys/locked-users |
Parameters
mount_accessor
(string, optional)
- Specifies the identifier of the auth mount entry to which the user belongs in the namespace in which the request was made. If no mount accessor is specified, the response will include locked users in all child namespaces of the namespace in which the request was made.
Sample request
Sample response
For deleted namespaces, the response will look like:
Sample request with mount accessor
Sample payload
Sample request
Unlock user
This endpoint unlocks a locked user with provided mount_accessor and alias_identifier in namespace in which the request was made if locked. This command is idempotent, meaning it succeeds even if user with the given mount_accessor and alias_identifier is not locked.
This endpoint was added in Vault 1.13.
Method | Path |
---|---|
POST | /sys/locked-users/:mount_accessor/unlock/:alias-identifier |
Parameters
mount_accessor
(string, required)
- Specifies the identifier of the auth mount entry to which the user belongsalias_identifier
(string, required)
- It is the name of the alias (user). For example, if the alias belongs to userpass backend, the name should be a valid username within userpass auth method. If the alias belongs to an approle auth method, the name should be a valid RoleID. If the alias belongs to an ldap auth method, the name should be a valid username.
Sample request