Skip to content

Commit e2739d6

Browse files
Add text for HVD STS support (#1459)
## Description <!-- ID for Jira ticket e.g [SPE-1234] --> :ticket: [SPE-1376] <!-- Add a brief description of changes here. Include any other necessary relevant links --> - Add note for HVD cross account access with AWS auth method and link to support doc <!-- Help your reviewer understand the type of review you need by selecting the scope and urgency. --> ### Requested review scope: - [x] Content touched by the PR _only_ (typos, clarifications, tips) - [ ] Code test (command and code block changes) - [ ] Flow and language near changes (new/rearranged steps) - [ ] Review everything (rewrites, major changes) ### Review urgency: - [ ] ASAP (bug fixes, broken content, imminent releases) - [ ] 3 days (small changes, easy reviews) - [ ] 1 week (default) - [x] Best effort (very non-urgent) <!-- Fill out only the appropriate checklist for your type of feature (or both if necessary) and delete the other one! --> ## All updates: <!-- This section is mandatory for all PRs: --> I have: - [ ] Verified that all status checks have passed - [x] Verified that preview environment has successfully deployed - [x] Verified appropriate `label` applied (`hcp` + `product name`) - [x] Added all required reviewers (code owners and external) [SPE-1234]: https://hashicorp.atlassian.net/browse/SPE-1234?atlOrigin=eyJpIjoiNWRkNTljNzYxNjVmNDY3MDlhMDU5Y2ZhYzA5YTRkZjUiLCJwIjoiZ2l0aHViLWNvbS1KU1cifQ [SPE-1376]: https://hashicorp.atlassian.net/browse/SPE-1376?atlOrigin=eyJpIjoiNWRkNTljNzYxNjVmNDY3MDlhMDU5Y2ZhYzA5YTRkZjUiLCJwIjoiZ2l0aHViLWNvbS1KU1cifQ
2 parents f884385 + 433945f commit e2739d6

File tree

2 files changed

+10
-0
lines changed
  • content/vault

2 files changed

+10
-0
lines changed

content/vault/v1.20.x/content/docs/auth/aws.mdx

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -680,6 +680,11 @@ Policy](#recommended-vault-iam-policy) except it doesn't need any further
680680
Furthermore, in the master account, Vault must be granted the action `sts:AssumeRole`
681681
for the IAM Role to be assumed.
682682

683+
If you run Vault Enterprise on the [HashiCorp Cloud Platform
684+
(HCP)](https://portal.cloud.hashicorp.com/sign-in), [contact
685+
support](https://support.hashicorp.com/hc/en-us/articles/19951252634387-Vault-AWS-Authentication-Cross-Account-Access-with-STS)
686+
for the cluster ID needed to enable cross account access.
687+
683688
### AWS instance metadata timeout
684689

685690
@include 'aws-imds-timeout.mdx'

content/vault/v1.21.x/content/docs/auth/aws.mdx

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -680,6 +680,11 @@ Policy](#recommended-vault-iam-policy) except it doesn't need any further
680680
Furthermore, in the master account, Vault must be granted the action `sts:AssumeRole`
681681
for the IAM Role to be assumed.
682682

683+
If you run Vault Enterprise on the [HashiCorp Cloud Platform
684+
(HCP)](https://portal.cloud.hashicorp.com/sign-in), [contact
685+
support](https://support.hashicorp.com/hc/en-us/articles/19951252634387-Vault-AWS-Authentication-Cross-Account-Access-with-STS)
686+
for the cluster ID needed to enable cross account access.
687+
683688
### AWS instance metadata timeout
684689

685690
@include 'aws-imds-timeout.mdx'

0 commit comments

Comments
 (0)