mirror of
https://github.com/optim-enterprises-bv/vault.git
synced 2025-11-04 04:28:08 +00:00
Update the page title/description (#29218)
This commit is contained in:
@@ -1,9 +1,9 @@
|
|||||||
---
|
---
|
||||||
layout: docs
|
layout: docs
|
||||||
page_title: Product Features FAQ
|
page_title: Product features FAQ
|
||||||
sidebar_title: FAQ for product and features
|
sidebar_title: FAQ for product and features
|
||||||
description: |-
|
description: |-
|
||||||
An FAQ page for product and features.
|
An frequently asked questions (FAQ) page for product and features.
|
||||||
---
|
---
|
||||||
|
|
||||||
# Product features FAQ
|
# Product features FAQ
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
layout: docs
|
layout: docs
|
||||||
page_title: Server Side Consistent Token FAQ
|
page_title: Server side consistent token FAQ
|
||||||
description: An list of frequently asked questions about server side consistent tokens
|
description: A list of frequently asked questions about server side consistent tokens.
|
||||||
---
|
---
|
||||||
|
|
||||||
# Server side consistent token FAQ
|
# Server side consistent token FAQ
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
layout: docs
|
layout: docs
|
||||||
page_title: Developer Quick Start
|
page_title: Developer quick start
|
||||||
description: Learn how to store and retrieve your first secret.
|
description: Learn how to store and retrieve your first secret from your applications using Vault API.
|
||||||
---
|
---
|
||||||
|
|
||||||
# Developer quick start
|
# Developer quick start
|
||||||
|
|||||||
@@ -4,7 +4,7 @@ page_title: GCP secret import source
|
|||||||
description: The Google Cloud Platform Secret Manager source imports secrets from GCP to Vault.
|
description: The Google Cloud Platform Secret Manager source imports secrets from GCP to Vault.
|
||||||
---
|
---
|
||||||
|
|
||||||
# GCP import source
|
# GCP secret import source
|
||||||
|
|
||||||
Use the GCP source to import secret data from GCP Secret Manager into your Vault instance. To use dynamic
|
Use the GCP source to import secret data from GCP Secret Manager into your Vault instance. To use dynamic
|
||||||
credentials with GCP import, ensure the [GCP secrets engine](/vault/docs/secrets/gcp) is
|
credentials with GCP import, ensure the [GCP secrets engine](/vault/docs/secrets/gcp) is
|
||||||
|
|||||||
@@ -4,7 +4,7 @@ page_title: Secrets import mappings
|
|||||||
description: Mappings lets users apply various filtering methods to secrets being imported in to Vault.
|
description: Mappings lets users apply various filtering methods to secrets being imported in to Vault.
|
||||||
---
|
---
|
||||||
|
|
||||||
# Import mappings
|
# Secrets import mappings
|
||||||
|
|
||||||
Vault supports multiple filter types for mapping blocks. Each of the types provides a different mechanism
|
Vault supports multiple filter types for mapping blocks. Each of the types provides a different mechanism
|
||||||
used to filter the scanned secrets and determine which will be imported in to Vault.
|
used to filter the scanned secrets and determine which will be imported in to Vault.
|
||||||
|
|||||||
Reference in New Issue
Block a user