From 8aaac638cd2920b8a11ffe4e84d30c6f324e740e Mon Sep 17 00:00:00 2001 From: hc-github-team-secure-vault-core <82990506+hc-github-team-secure-vault-core@users.noreply.github.com> Date: Thu, 12 Oct 2023 16:08:49 -0400 Subject: [PATCH] backport of commit 1b2b647b2129023c1e43b62ad7dd7db522514691 (#23643) Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com> --- website/content/docs/enterprise/namespaces/index.mdx | 6 ++++-- website/content/partials/api/restricted-endpoints.mdx | 2 +- 2 files changed, 5 insertions(+), 3 deletions(-) diff --git a/website/content/docs/enterprise/namespaces/index.mdx b/website/content/docs/enterprise/namespaces/index.mdx index 7200fb120e..5ec8c65fe3 100644 --- a/website/content/docs/enterprise/namespaces/index.mdx +++ b/website/content/docs/enterprise/namespaces/index.mdx @@ -103,8 +103,10 @@ admins to allow teams to self-manage their namespace. In addition to basic management, delegate admins can create child namespaces and assign admin rights to subordinate delegate admins. -Additionally, administrative namespaces let Vault administrators grant access to -a [predefined subset of privileged endpoints](#privileged-endpoints) by setting +Additionally, +[administrative namespaces](/vault/docs/enterprise/namespaces/create-admin-namespace) +let Vault administrators grant access to a +[predefined subset of privileged endpoints](#privileged-endpoints) by setting the relevant namespace parameters in their Vault configuration file. ## Vault API and namespaces diff --git a/website/content/partials/api/restricted-endpoints.mdx b/website/content/partials/api/restricted-endpoints.mdx index cab248c099..6d2d63e152 100644 --- a/website/content/partials/api/restricted-endpoints.mdx +++ b/website/content/partials/api/restricted-endpoints.mdx @@ -1,4 +1,4 @@ - + The CLI commands associated with restricted API paths are also restricted.