-
Notifications
You must be signed in to change notification settings - Fork 1.8k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Backports #11419 * Edit two guides for Cloud users PAM guide - Minor style/clarity/grammar edits - Use a ScopedBlock to hide Cloud-irrelevant information in the MOTD section - The organization of the original guide was a bit scrambled, so I attempted to reorganize it into a form that made more sense. Tsh guide - Use ScopedBlocks to provide scope-relevant information. - Mention Machine ID in the "### SSH certificates for automation" section. - Misc grammar/clarity/style edits * Respond to PR feedback Clarify two guides and two intro pages Backports #11913 * Clarify two guides and two intro pages See #11841 Make the Adding Nodes guide more usable for Cloud - Add a ca_pin preset - Clarify that tctl must be run on the local machine for Cloud users - Structure the guide as a step-by-step tutorial. The guide already included sequences of sample commands, so all this took was to rename headings according to the "Step n/d." format and move the CA pinning section into the section on starting the Node. - Add environment variables to use for storing a CA pin and invite token to sample commands, plus piped commands to extract these strings from the output of tctl commands. - Use a ScopedBlock to hide the Node Tunneling section for Cloud users - Indicate that the --auth-server flag in "teleport start" requires a port. Add intros to the Admin and Operations menu pages - Clarify the purpose of the Admin Guides and Operations sections by adding an intro paragraph to each page. Since these sections are similar in scope, I added links from one to the other with statements about how the two sections differ. - Replace lists of links with Tiles. GitHub SSO - Move the step to create an OAuth app out of the Prerequisites and into its own step. This makes it easier to give the instructions to use a specific callback URL proper space. - Be more explicit about the rp_ip value. - Add explicit instructions for logging in to the cluster after creating the auth preference, including screenshots of expected results. * Fix wording and linter issues following PR review * Respond to PR feedback Remove a misleading instruction re: CA pinning. Also move some text about CA pinning to a more appropriate location. Edit four Access Controls pages for Cloud users Backports #11826 * Edit four Access Controls pages for Cloud users See #10638 Access Controls Getting Started guide - Add a tabbed Prerequisites section for users of different scopes - Use a ScopedBlock to show OIDC and SAML instructions as Tabs for commercial Teleport users and GitHub instructions for OSS Teleport users - Light style/grammar/clarity edits Role Templates - Tabbed Prerequisites section for different scopes - Adjust the visibility of minor details using ScopedBlocks Locking - Add a scoped Tabs component to the Prerequisites section - Add a ScopedBlock to hide CLI- and config file-specific instructions from Cloud users. WebAuthn - Add scoped Tabs to the Prerequisites section - Move Tabs with TabItems for static configurations and dynamic resources into ScopedBlocks. This way, we don't have to show static configuration instructions to Cloud users. - Remove duplicate config field explanations. - Minor style/grammar edits * Respond to PR feedback - Change verbiage re: belonging to a role - Remove U2F migration section
- Loading branch information
Showing
16 changed files
with
1,050 additions
and
632 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -15,12 +15,12 @@ description: How to lock compromised users or nodes | |
deployment. | ||
</Details> | ||
|
||
System administrators can disable a compromised user, node or | ||
prevent access during cluster maintenance by placing a lock | ||
System administrators can disable a compromised user or node—or | ||
prevent access during cluster maintenance—by placing a lock | ||
on a session, user or host identity. | ||
|
||
Teleport will reject new API requests and terminate active | ||
connections to SSH, database, desktop and Kubernetes sessions | ||
connections to SSH, database, desktop, and Kubernetes sessions | ||
matching the lock's target. | ||
|
||
A lock can target the following objects or attributes: | ||
|
@@ -32,7 +32,7 @@ A lock can target the following objects or attributes: | |
- a Teleport node by the node's UUID (effectively unregistering it from the | ||
cluster) | ||
- a Windows desktop by the desktop's name | ||
- an [access request](../../enterprise/workflow/index.mdx) by UUID | ||
- an [Access Request](../../enterprise/workflow/index.mdx) by UUID | ||
|
||
## Prerequisites | ||
|
||
|
@@ -42,7 +42,8 @@ A lock can target the following objects or attributes: | |
|
||
## Step 1/2. Create a lock | ||
|
||
To create a new lock, one can run the `tctl lock` command: | ||
You can create a new lock with the `tctl lock` command. Specify the lock target | ||
with one of the following options: | ||
|
||
<Tabs> | ||
<TabItem label="Username"> | ||
|
@@ -119,7 +120,9 @@ $ tctl create -f locksmith.yaml | |
# role 'locksmith' has been created | ||
``` | ||
|
||
And assign this role to a user. Re-login for this role to take effect. | ||
And assign this role to a user. The user must log in again for this role to take | ||
effect. | ||
|
||
</Details> | ||
|
||
With a lock in force, all established connections involving the lock's target | ||
|
@@ -140,7 +143,7 @@ $ tctl lock [email protected] --message="Please come back tomorrow." --ttl= | |
</Admonition> | ||
|
||
<Details title="Under the hood: Lock resource and expiration" opened={false}> | ||
Note that without specifying `--ttl` or `--expires` the created lock remains in | ||
Note that without specifying `--ttl` or `--expires`, the created lock remains in | ||
force until explicitly removed with `tctl rm`. Refer to `tctl lock --help` for | ||
the list of all supported parameters. | ||
|
||
|
@@ -159,7 +162,7 @@ spec: | |
``` | ||
The `kind: lock` resources can also be created and updated using `tctl create` | ||
as per usual, see the [Admin Guide](../../setup/reference/resources.mdx) for more | ||
as per usual. See the [Admin Guide](../../setup/reference/resources.mdx) for more | ||
details. | ||
</Details> | ||
|
||
|
@@ -182,20 +185,24 @@ Deleting a lock will allow new sessions or host connections. | |
|
||
## Next steps: Locking modes | ||
|
||
If a Teleport node or proxy cannot properly synchronize its local lock view | ||
with the backend, there is a decision to be made about whether to rely on the | ||
last known locks. This decision strategy is encoded as one of the two modes: | ||
If a Teleport node or Proxy Service cannot properly synchronize its local lock | ||
view with the backend, there is a decision to be made about whether to rely on | ||
the last known locks. This decision strategy is encoded as one of the two modes: | ||
- `strict` mode causes all interactions to be terminated when the locks are not | ||
guaranteed to be up to date | ||
- `best_effort` mode keeps relying on the most recent locks | ||
|
||
The cluster-wide mode defaults to `best_effort`. | ||
You can set up default locking mode via API or CLI using resource `cluster_auth_preference` | ||
or static configuration file: | ||
<ScopedBlock scope={["oss", "enterprise"]}> | ||
|
||
The cluster-wide mode defaults to `best_effort`. You can set up the default | ||
locking mode via API or CLI using a `cluster_auth_preference` resource or static | ||
configuration file: | ||
|
||
<Tabs> | ||
<TabItem label="API or CLI"> | ||
Create a YAML file `cap.yaml` or get the existing file using `tctl get cap` | ||
|
||
Create a YAML file called `cap.yaml` or get the existing file using | ||
`tctl get cap`. | ||
|
||
```yaml | ||
kind: cluster_auth_preference | ||
|
@@ -214,18 +221,45 @@ or static configuration file: | |
``` | ||
</TabItem> | ||
<TabItem label="Static Config"> | ||
Edit the `teleport.yaml` of the Auth server: | ||
Edit `/etc/teleport.yaml` on the Auth Server: | ||
|
||
```yaml | ||
auth_service: | ||
authentication: | ||
locking_mode: best_effort | ||
``` | ||
|
||
Restart the auth server for the change to take effect. | ||
Restart the Auth Server for the change to take effect. | ||
</TabItem> | ||
</Tabs> | ||
|
||
</ScopedBlock> | ||
<ScopedBlock scope={["cloud"]}> | ||
|
||
The cluster-wide mode defaults to `best_effort`. You can set up the default | ||
locking mode via API or CLI using a `cluster_auth_preference` resource: | ||
|
||
Create a YAML file called `cap.yaml` or get the existing file using | ||
`tctl get cap`. | ||
|
||
```yaml | ||
kind: cluster_auth_preference | ||
metadata: | ||
name: cluster-auth-preference | ||
spec: | ||
locking_mode: best_effort | ||
version: v2 | ||
``` | ||
|
||
Create a resource: | ||
|
||
```code | ||
$ tctl create -f cap.yaml | ||
# cluster auth preference has been updated | ||
``` | ||
|
||
</ScopedBlock> | ||
|
||
It is also possible to configure the locking mode for a particular role: | ||
|
||
```yaml | ||
|
Oops, something went wrong.