mirror of
https://github.com/optim-enterprises-bv/vault.git
synced 2025-11-02 03:27:54 +00:00
secret/aws: Using roles instead of policy
This commit is contained in:
@@ -26,7 +26,7 @@ func Backend() *framework.Backend {
|
||||
Paths: []*framework.Path{
|
||||
pathConfigRoot(),
|
||||
pathConfigLease(&b),
|
||||
pathPolicy(),
|
||||
pathRoles(),
|
||||
pathUser(&b),
|
||||
},
|
||||
|
||||
@@ -52,5 +52,5 @@ are automatically revoked at the end of the lease.
|
||||
|
||||
After mounting this backend, credentials to generate IAM keys must
|
||||
be configured with the "root" path and policies must be written using
|
||||
the "policy/" endpoints before any access keys can be generated.
|
||||
the "roles/" endpoints before any access keys can be generated.
|
||||
`
|
||||
|
||||
Reference in New Issue
Block a user