diff --git a/website/content/docs/auth/kubernetes.mdx b/website/content/docs/auth/kubernetes.mdx index 6ba8312b405..6cb1f485782 100644 --- a/website/content/docs/auth/kubernetes.mdx +++ b/website/content/docs/auth/kubernetes.mdx @@ -209,16 +209,26 @@ kubectl create clusterrolebinding vault-client-auth-delegator \ #### Continue using long-lived tokens -The default Kubernetes secret created for a service account is still long lived, -and can be used as the `token_reviewer_jwt` without needing to refresh it. To -find the secret, run: +You can create a long-lived secret using the instructions [here][k8s-create-secret] +and use that as the `token_reviewer_jwt`. In this example, the `vault` service +account would need the `system:auth-delegator` ClusterRole: ```bash -kubectl get secret "$(kubectl get serviceaccount default -o jsonpath='{.secrets[0].name}')" +kubectl apply -f - <