## JWT vs OIDC Auth Methods

Since both the `oidc` and `jwt` auth methods ultimately operate on JWTs as
bearer tokens, it may be confusing to know which is right for a given use case.

- **JWT**: The user or application performing the Consul login must already be
  in possession of a valid JWT to begin. There is no browser interaction
  required. This is ideal for machine-oriented headless login where an operator
  may have already arranged for a valid JWT to be dropped on a VM or provided
  to a container. 

- **OIDC**: The user performing the Consul login does not have a JWT nor do
  they even need to know what that means. This is ideal for human-oriented
  interactive login where an operator or administrator may have deployed SSO
  widely and doesn't want to have the burden of tracking and distributing
  Consul ACL tokens to any authorized coworker who may need to have access to a
  Consul instance. Browser interaction is required. **This is only available in
  [Consul Enterprise](https://www.hashicorp.com/products/consul/)**.