Skip to content

Commit 2a41441

Browse files
committed
Fix bad cli call in the docs
1 parent 5501daa commit 2a41441

File tree

3 files changed

+4
-4
lines changed

3 files changed

+4
-4
lines changed

docs/deployment_guide/appendix/authentication/authentication_flow.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -132,7 +132,7 @@ Troubleshooting
132132
Verify IdP configuration (redirect URIs, client ID/secret), Envoy OAuth2 and JWT provider settings (issuer, audience, JWKS URI), and that the IdP is reachable from the cluster.
133133

134134
**User has no permissions (403)**
135-
Check that the user has roles in OSMO (via ``osmo user roles list <user_id>`` or IdP mapping). Verify ``x-osmo-user`` and ``x-osmo-roles`` in Envoy logs. Ensure the role has policies that allow the requested action (see :doc:`roles_policies`).
135+
Check that the user has roles in OSMO (via ``osmo user get <user_id>`` or IdP mapping). Verify ``x-osmo-user`` and ``x-osmo-roles`` in Envoy logs. Ensure the role has policies that allow the requested action (see :doc:`roles_policies`).
136136

137137
**Token validation failures**
138138
Ensure issuer and audience in Envoy match the JWT. Check JWKS URI connectivity from Envoy. For access tokens, ensure the token exists and is not expired.

docs/deployment_guide/appendix/authentication/identity_provider_setup.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -187,14 +187,14 @@ Verification
187187
============
188188

189189
- **Browser:** Open ``https://<your-domain>`` in a private window. You should be redirected to the IdP, then back to OSMO with a session.
190-
- **CLI:** After logging in, run ``osmo user roles list <user_id>`` to confirm the user has the expected roles.
190+
- **CLI:** After logging in, run ``osmo user get <user_id>`` to confirm the user has the expected roles.
191191

192192
Troubleshooting
193193
===============
194194

195195
- **Invalid token / 401:** Check issuer and audience in Envoy match the JWT. Ensure the IdP’s JWKS URI is reachable from the cluster and the signing key is present.
196196
- **Redirect fails:** Ensure the redirect URI in the IdP exactly matches (scheme, host, path, no trailing slash).
197-
- **User has no roles / 403:** Ensure the user exists in OSMO and has roles (via ``osmo user roles list <user_id>`` or IdP mapping). Verify the user claim (e.g. ``preferred_username``, ``email``) matches what OSMO expects.
197+
- **User has no roles / 403:** Ensure the user exists in OSMO and has roles (via ``osmo user get <user_id>`` or IdP mapping). Verify the user claim (e.g. ``preferred_username``, ``email``) matches what OSMO expects.
198198

199199
.. seealso::
200200

docs/deployment_guide/appendix/authentication/roles_policies.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -481,7 +481,7 @@ Pool Access Issues
481481
--------------------
482482

483483
1. **Check role policies**: Ensure the role has a policy allowing ``workflow:Create`` scoped to the target pool (e.g., ``resources: ["pool/my-pool"]``)
484-
2. **Check role assignment**: Ensure the user has the role in OSMO (via ``osmo user roles list <user_id>`` or IdP role mapping)
484+
2. **Check role assignment**: Ensure the user has the role in OSMO (via ``osmo user get <user_id>`` or IdP role mapping)
485485
3. **Review resource scope**: Verify the policy's ``resources`` field matches the pool name (e.g., ``pool/my-pool`` or ``pool/*``)
486486

487487
.. _actions_resources_reference:

0 commit comments

Comments
 (0)