From 4083ce71af209634897b98d3a4ab324fbf78809e Mon Sep 17 00:00:00 2001 From: trujillo-adam <47586768+trujillo-adam@users.noreply.github.com> Date: Tue, 8 Mar 2022 16:02:59 -0800 Subject: [PATCH] Apply suggestions from code review Co-authored-by: mrspanishviking --- website/content/docs/security/acl/acl-policies.mdx | 2 +- website/content/docs/security/acl/acl-roles.mdx | 6 +++--- website/content/docs/security/acl/acl-tokens.mdx | 2 +- 3 files changed, 5 insertions(+), 5 deletions(-) diff --git a/website/content/docs/security/acl/acl-policies.mdx b/website/content/docs/security/acl/acl-policies.mdx index b164e25f05..485b1a8f93 100644 --- a/website/content/docs/security/acl/acl-policies.mdx +++ b/website/content/docs/security/acl/acl-policies.mdx @@ -113,7 +113,7 @@ Use the `policy` keyword and one of the following access levels to set a policy - `write`: Allows the resource to be read and modified. - `deny`: Denies read and write access to the resource. -The special `list` access level provides access to all keys with the specified resource label in the Consul KV. The `list` access level can only be used with the `key_prefix` resource. The [`acl.enable_key_list_policy`](/docs/agent/options#acl_enable_key_list_policy) setting must be set to `true`. +The special `list` access level provides access to all keys with the specified resource label in the [Consul KV](/commands/kv/). The `list` access level can only be used with the `key_prefix` resource. The [`acl.enable_key_list_policy`](/docs/agent/options#acl_enable_key_list_policy) setting must be set to `true`. ### Matching and Prefix Values diff --git a/website/content/docs/security/acl/acl-roles.mdx b/website/content/docs/security/acl/acl-roles.mdx index 2632286676..c5bd0661b0 100644 --- a/website/content/docs/security/acl/acl-roles.mdx +++ b/website/content/docs/security/acl/acl-roles.mdx @@ -42,7 +42,7 @@ Issue the `consul acl role create` command to create roles. In the following exa $ consul acl role create -name "crawler" -description "web crawler role" -policy-name "crawler-kv" -policy-name "crawler-key" ``` -Refer to the [command line documentation](/command/acl/role) for details. +Refer to the [command line documentation](/commands/acl/role) for details. ### API @@ -56,7 +56,7 @@ Refer to the [API documentation](/api-docs/acl/roles) for details. ## Role Attributes -Roles may contain the following table describe the attributes: +Roles may contain the following attributes: - `ID`: The `ID` is an auto-generated public identifier. You can specify the role `ID` when linking it to tokens. - `Name`: A unique meaningful name for the role. You can specify the role `Name` when linking it to tokens. @@ -277,7 +277,7 @@ NodeIdentities = { - `NodeIdentities`: Declares a node identity block. -- `NodeIdentities.ServiceName`: String value that specifies the name of the node you want to associate with the policy. +- `NodeIdentities.NodeName`: String value that specifies the name of the node you want to associate with the policy. - `NodeIdentitites.Datacenters`: Array that specifies the names of datacenters in which the node identity applies. This field is optional. Refer to the the [API documentation for roles](/api/acl/roles#sample-payload) for additional information and examples. diff --git a/website/content/docs/security/acl/acl-tokens.mdx b/website/content/docs/security/acl/acl-tokens.mdx index c9831bf5da..b417c50896 100644 --- a/website/content/docs/security/acl/acl-tokens.mdx +++ b/website/content/docs/security/acl/acl-tokens.mdx @@ -19,7 +19,7 @@ Refer to the [ACL system workflow overview](/docs/security/acl/acl-system#workfl The person responsible for administrating ACLs can use the API or CLI to create and link tokens to entities that enable permissions to resources. Refer to the [ACL API](/api-docs/acl) and [ACL CLI](/commands/acl) documentation for instructions on how to create and link tokens. Tokens can also be created dynamically from trusted external system using an -[auth method](/docs/security/acl/auth-methods). +[auth method](/docs/security/acl/auth-methods). Additionally, a tutorial is available to help you get started with creating tokens. Visit the the [Secure Consul with Access Control Lists (ACLs) tutorial](https://learn.hashicorp.com/tutorials/consul/access-control-setup-production?in=consul/security) to learn more through an interactive sandbox environment. ## Passing Tokens