From 8aaac638cd2920b8a11ffe4e84d30c6f324e740e Mon Sep 17 00:00:00 2001
From: hc-github-team-secure-vault-core
<82990506+hc-github-team-secure-vault-core@users.noreply.github.com>
Date: Thu, 12 Oct 2023 16:08:49 -0400
Subject: [PATCH] backport of commit 1b2b647b2129023c1e43b62ad7dd7db522514691
(#23643)
Co-authored-by: Sarah Chavis <62406755+schavis@users.noreply.github.com>
---
website/content/docs/enterprise/namespaces/index.mdx | 6 ++++--
website/content/partials/api/restricted-endpoints.mdx | 2 +-
2 files changed, 5 insertions(+), 3 deletions(-)
diff --git a/website/content/docs/enterprise/namespaces/index.mdx b/website/content/docs/enterprise/namespaces/index.mdx
index 7200fb120e..5ec8c65fe3 100644
--- a/website/content/docs/enterprise/namespaces/index.mdx
+++ b/website/content/docs/enterprise/namespaces/index.mdx
@@ -103,8 +103,10 @@ admins to allow teams to self-manage their namespace. In addition to basic
management, delegate admins can create child namespaces and assign admin rights
to subordinate delegate admins.
-Additionally, administrative namespaces let Vault administrators grant access to
-a [predefined subset of privileged endpoints](#privileged-endpoints) by setting
+Additionally,
+[administrative namespaces](/vault/docs/enterprise/namespaces/create-admin-namespace)
+let Vault administrators grant access to a
+[predefined subset of privileged endpoints](#privileged-endpoints) by setting
the relevant namespace parameters in their Vault configuration file.
## Vault API and namespaces
diff --git a/website/content/partials/api/restricted-endpoints.mdx b/website/content/partials/api/restricted-endpoints.mdx
index cab248c099..6d2d63e152 100644
--- a/website/content/partials/api/restricted-endpoints.mdx
+++ b/website/content/partials/api/restricted-endpoints.mdx
@@ -1,4 +1,4 @@
-
+
The CLI commands associated with restricted API paths are also restricted.