vault.antts.xyz Open in urlscan Pro
149.202.77.170  Public Scan

Submitted URL: https://vault.antts.xyz/
Effective URL: https://vault.antts.xyz/ui/
Submission: On February 24 via api from US — Scanned from US

Form analysis 1 forms found in the DOM

<form id="auth-form">
  <div class="field">
    <label for="role" class="is-label">Role</label>
    <div class="control">
      <input placeholder="Default" autocomplete="off" spellcheck="false" name="role" id="role" class="input" type="text">
    </div>
    <div class="is-flex-center padding-top size-small" data-test-inline-alert="">
      <svg class="flight-icon flight-icon-info flight-icon-display-inline has-text-info" aria-hidden="true" data-test-icon="info" fill="currentColor" id="icon-ember30" width="16" height="16" viewBox="0 0 16 16" xmlns="http://www.w3.org/2000/svg">
        <use href="#flight-info-16"></use>
      </svg>
      <p data-test-inline-error-message=""> Leave blank to sign in with the default role if one is configured </p>
    </div>
  </div>
  <!---->
  <div>
    <div id="ember31" class="ember-view"><!----></div>
  </div>
  <button class="button is-primary " id="auth-submit" type="submit"> Sign in with OIDC Provider </button>
</form>

Text Content

HCP LINK ERROR

Timestamp

Not available

Error

Not available

Additional information

Check the logs for more information

Close



SIGN IN TO VAULT


 * oidc
 * Other

oidc/

Antts Authentik Auth
Role


Leave blank to sign in with the default role if one is configured


Sign in with OIDC Provider

Contact your administrator for login credentials

© 2024 HashiCorp Vault 1.15.2 Upgrade to Vault Enterprise Documentation

The Vault Browser CLI provides an easy way to execute common Vault CLI commands,
such as write, read, delete, and list. It does not include kv v2 write or put
commands. For guidance, type `help`.

Examples:

→ Write secrets to kv v1: write <mount>/my-secret foo=bar

→ List kv v1 secret keys: list <mount>/

→ Read a kv v1 secret: read <mount>/my-secret

→ Mount a kv v2 secret engine: write sys/mounts/<mount> type=kv
options=version=2

→ Read a kv v2 secret: kv-get <mount>/secret-path

→ Read a kv v2 secret's metadata: kv-get <mount>/secret-path -metadata