Skip to content

Commit 433945f

Browse files
Add text for HVD STS support
1 parent c0506ff commit 433945f

File tree

2 files changed

+10
-0
lines changed
  • content/vault

2 files changed

+10
-0
lines changed

content/vault/v1.20.x/content/docs/auth/aws.mdx

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -680,6 +680,11 @@ Policy](#recommended-vault-iam-policy) except it doesn't need any further
680680
Furthermore, in the master account, Vault must be granted the action `sts:AssumeRole`
681681
for the IAM Role to be assumed.
682682

683+
If you run Vault Enterprise on the [HashiCorp Cloud Platform
684+
(HCP)](https://portal.cloud.hashicorp.com/sign-in), [contact
685+
support](https://support.hashicorp.com/hc/en-us/articles/19951252634387-Vault-AWS-Authentication-Cross-Account-Access-with-STS)
686+
for the cluster ID needed to enable cross account access.
687+
683688
### AWS instance metadata timeout
684689

685690
@include 'aws-imds-timeout.mdx'

content/vault/v1.21.x/content/docs/auth/aws.mdx

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -680,6 +680,11 @@ Policy](#recommended-vault-iam-policy) except it doesn't need any further
680680
Furthermore, in the master account, Vault must be granted the action `sts:AssumeRole`
681681
for the IAM Role to be assumed.
682682

683+
If you run Vault Enterprise on the [HashiCorp Cloud Platform
684+
(HCP)](https://portal.cloud.hashicorp.com/sign-in), [contact
685+
support](https://support.hashicorp.com/hc/en-us/articles/19951252634387-Vault-AWS-Authentication-Cross-Account-Access-with-STS)
686+
for the cluster ID needed to enable cross account access.
687+
683688
### AWS instance metadata timeout
684689

685690
@include 'aws-imds-timeout.mdx'

0 commit comments

Comments
 (0)