diff --git a/docs/helmchart.md b/docs/helmchart.md
index f8d4c85b3d429fdbb7115dab0b86aef73c05bdb6..d3799663db8e32c52b789f1e5c328fe215bb1aff 100644
--- a/docs/helmchart.md
+++ b/docs/helmchart.md
@@ -37,25 +37,24 @@ This table lists the variables you are most likely to change. Take a look at the
 | `login.db.password`                  | Database password for backend                           | stackspin                               |
 | `login.db.database`                  | Database name for backend                               | stackspin                               |
 | `login.db.user`                      | Database user for backend                               | stackspin                               |
-| `kratos.kratos.identitySchemas`                        | Tuple of filenames and JSON data to install as available schema file | See values.yaml                                                |
-| `kratos.kratos.config.identity.default_schema_url`     | Location of default schema file                                         | file:///etc/config/identity.default.schema.json                |
+| `kratos.kratos.identitySchemas`                        | Tuple of filenames and JSON data to install as available schema file | See values.yaml                                                  |
+| `kratos.kratos.config.identity.default_schema_url`     | Location of default schema file                                        | file:///etc/config/identity.default.schema.json                |
 | `kratos.kratos.config.dsn`                             | Database endpoint                                                      | postgres://kratos:kratos@single-sign-on-postgresql:5432/kratos |
-| `kratos.kratos.serve.public.base_url`                  | URL where to find kratos public API                                    | **https://sso.stackspin.example.net/api/**                   |
-| `kratos.kratos.selfservice.default_browser_return_url` | Default URL to return to with unknown request                          | **https://sso.stackspin.example.net/login/login**            |
-| `kratos.kratos.selfservice.methods.link.enabled`       | If account recovery with a recovery link is enabled                    | true                                                           |
-| `kratos.kratos.selfservice.flows.recovery.enabled`     | If account recovery flow is enabled                                    | true                                                           |
+| `kratos.kratos.serve.public.base_url`                  | URL where to find kratos public API                                    | **https://sso.stackspin.example.net/api/**                     |
+| `kratos.kratos.selfservice.default_browser_return_url` | Default URL to return to with unknown request                          | **https://sso.stackspin.example.net/login/login**              |
 | `kratos.kratos.selfservice.flows.recovery.lifespan`    | Time recovery link is valid for password reset                         | 15m                                                            |
-| `kratos.kratos.selfservice.flows.recovery.ui_url`      | **Where to link to for recovery**                                      | **https://sso.stackspin.example.net/login/recovery**         |
-| `kratos.kratos.selfservice.flows.login.ui_url`         | **Where to link to for login**                                         | **https://sso.stackspin.example.net/login/login**            |
-| `kratos.kratos.selfservice.flows.settings.ui_url`      | **Where to link to for setting/profile update**                        | **https://sso.stackspin.example.net/login/settings**         |
-| `kratos.kratos.selfservice.flows.registration.ui_url`  | **Where to link to for account registration**                          | **https://sso.stackspin.example.net/login/registration**     |
-| `kratos.kratos.secrets.session`                       | Array of strings for session secrets                                   | See values.yaml                                                |
+| `kratos.kratos.selfservice.flows.recovery.ui_url`      | **Where to link to for recovery**                                      | **https://sso.stackspin.example.net/login/recovery**           |
+| `kratos.kratos.selfservice.flows.login.ui_url`         | **Where to link to for login**                                         | **https://sso.stackspin.example.net/login/login**              |
+| `kratos.kratos.selfservice.flows.settings.ui_url`      | **Where to link to for setting/profile update**                        | **https://sso.stackspin.example.net/login/settings**           |
+| `kratos.kratos.selfservice.flows.registration.ui_url`  | **Where to link to for account registration**                          | **https://sso.stackspin.example.net/login/registration**       |
+| `kratos.kratos.secrets.session`                       | Array of strings for session secrets                                    | See values.yaml                                                |
 | `kratos.kratos.courier.smtp.connection_uri`            | Config of SMTP server                                                  | smtps://username:password@smtp.example.net:456/                |
 | `kratos.kratos.courier.smtp.from_address`              | From email address                                                     | no-reply@example.net                                           |
-| `hydra.hydra.config.urls.self.issuer`| **Base URI of the oAuth server**                        | **https://sso.stackspin.example.net**         |
-| `hydra.hydra.config.urls.login`      | **URI that will be used for the login page**            | **https://sso.stackspin.example.net/login**   |
-| `hydra.hydra.config.urls.consent`    | **URI that will be used for permission checks**         | **https://sso.stackspin.example.net/consent** |
-| `hydra.hydra.config.secrets.system`  | Secret that is used to generate secure tokens           | ["YouReallyNeedToChangeThis"]           |
+| `hydra.hydra.config.urls.self.issuer`| **Base URI of the oAuth server**                        | **https://sso.stackspin.example.net**                       |
+| `hydra.hydra.config.urls.login`      | **URI that will be used for the login page**            | **https://sso.stackspin.example.net/login**                 |
+| `hydra.hydra.config.urls.consent`    | **URI that will be used for permission checks**         | **https://sso.stackspin.example.net/consent**               |
+| `hydra.hydra.config.dsn`             | Database endpoint for Hydra                             | postgres://hydra:hydra@single-sign-on-postgresql:5432/hydra |
+| `hydra.hydra.config.secrets.system`  | Secret that is used to generate secure tokens str[]     | ["YouReallyNeedToChangeThis"]                               |
 | `oAuthClients`                       | A list of clients that need to be registered after installation. See [Registering clients](#registering-clients) for more info | user-panel configuration (**Change the `clientSecret`**!) |
 
 
@@ -65,11 +64,12 @@ Normally one would use the [Stackspin Dashboard](https://open.greenhost.net/stac
 use the command line with `kubectl`
 
 ```
-kubectl -n stackspin get pods
+kubectl get pod -n stackspin -l 'app.kubernetes.io/name=single-sign-on-login'
 ```
 
-This will get a list of pods, we need the pod which is called `single-sign-on-login-xxxx`,
-once you found the name you can interact with the flask app:
+This will get the pod which provides the login panel. The pod name looks like
+`single-sign-on-login-xxxx`, once you found the name you can interact with 
+the flask app:
 
 List users:
 
diff --git a/helmchart/single-sign-on/templates/job-create-admin.yaml b/helmchart/single-sign-on/templates/job-create-admin.yaml
index 824a42ea637c4ec3f6f5e14c80b5eafa6d4f1c88..34399597e05424395102e1d8d5fa8281596ce85d 100644
--- a/helmchart/single-sign-on/templates/job-create-admin.yaml
+++ b/helmchart/single-sign-on/templates/job-create-admin.yaml
@@ -37,7 +37,7 @@ spec:
         - name: APP_SETTINGS
           value: config.DevelopmentConfig
         - name: SETUP_USER
-          value: {{ .Values.login.login }}
+          value: {{ .Values.login.user }}
         - name: SETUP_PASSWORD
           value: {{ .Values.login.password }}
         command: ["/bin/bash", "-c"]
diff --git a/helmchart/single-sign-on/values.yaml b/helmchart/single-sign-on/values.yaml
index c25b3d2b662dec0996d13281b92a0fb664179e82..0048f9f1fd8faed56ffe6dc8bc423d21568567da 100644
--- a/helmchart/single-sign-on/values.yaml
+++ b/helmchart/single-sign-on/values.yaml
@@ -208,7 +208,7 @@ login:
     user: stackspin
     passowrd: stackspin
     database: stackspin
-  login: admin@example.com
+  user: admin@example.com
   password: ThisIsNotASecurePassword
 
 # oAuthClients is a list of clients that are created during the installation process