This is a generic question about storing hashed password with salt in a database.
I'm implementing https://docs.rs/rust-argon2/0.5.1/argon2/
If you would open the web page above and see this line:
let matches = argon2::verify_encoded(&hash, password).unwrap();
You'll see that the logic takes the hash (supposed retrieved from the database) with the password (supposed which the user entered on a web page) and it can produce the verify result. It doesn't even need to use the salt.
Therefore, the salt is used only upon producing the hashed password, and not during verification. Is my understanding correct?