diff --git a/docs/pages/desktop-access/getting-started.mdx b/docs/pages/desktop-access/getting-started.mdx index 47f9b256d3dec..2824d7bca0f5b 100644 --- a/docs/pages/desktop-access/getting-started.mdx +++ b/docs/pages/desktop-access/getting-started.mdx @@ -22,10 +22,10 @@ This guide requires you to have: - An Active Directory domain, configured for LDAPS (Teleport requires an encrypted LDAP connection) - Access to a Domain Controller -- An existing Teleport cluster and user, version 8.0 or newer - - See [Teleport Getting Started](../getting-started.mdx) if you're new to Teleport -- A Linux server to run the Teleport Desktop Access service on - - You can reuse an existing server running any other Teleport instance +- An existing Teleport cluster (Teleport Cloud, Open Source, or Enterprise) and user, version 8.0 or newer. + - See [Teleport Getting Started](../getting-started.mdx) if you're new to Teleport. +- A Linux server to run the Teleport Desktop Access service on. + - You can reuse an existing server running any other Teleport instance. ## Step 1/6. Create a restrictive service account @@ -95,7 +95,7 @@ dsacls "CN=NTAuthCertificates,CN=Public Key Services,CN=Services,CN=Configuratio The Teleport service account is only needed to authenticate over LDAP, meaning -that it needn't be able to login to Windows machines like an ordinary user. +that it needn't be able to log in to Windows machines like an ordinary user. Restrict it from doing so by creating a new Group Policy Object (GPO) linked to your entire domain, and then deny it interactive login. diff --git a/docs/pages/kubernetes-access/getting-started/agent.mdx b/docs/pages/kubernetes-access/getting-started/agent.mdx index 5d29cffd7a7ec..d517cffbc1c74 100644 --- a/docs/pages/kubernetes-access/getting-started/agent.mdx +++ b/docs/pages/kubernetes-access/getting-started/agent.mdx @@ -1,10 +1,10 @@ --- -title: Connect Kubernetes Cluster to Teleport -description: Connecting Kubernetes cluster to Teleport +title: Connect a Kubernetes Cluster to Teleport +description: Connecting a Kubernetes cluster to Teleport --- -This guide works for Open Source and Enterprise, self-hosted or cloud-hosted editions of Teleport. +You can use this guide with Teleport Open Source, Teleport Enterprise, and Teleport Cloud. ## Prerequisites diff --git a/docs/pages/kubernetes-access/getting-started/cluster.mdx b/docs/pages/kubernetes-access/getting-started/cluster.mdx index 9e90424bd37b4..4ab5f463e1b13 100644 --- a/docs/pages/kubernetes-access/getting-started/cluster.mdx +++ b/docs/pages/kubernetes-access/getting-started/cluster.mdx @@ -16,6 +16,14 @@ While completing this guide, you will deploy a single Teleport pod running the A If you are already running Teleport on another platform, you can use your existing Teleport deployment to access your Kubernetes cluster. [Follow our guide](./agent.mdx) to connect your Kubernetes cluster to Teleport. +
+This guide shows you how to deploy the Teleport Auth Service and Proxy Service on a Kubernetes cluster. These services are fully managed in Teleport Cloud. + +Instead, Teleport Cloud users should consult the following guide, which shows you how to connect a Teleport Kubernetes Service node to an existing Teleport cluster. + +[Connect a Kubernetes Cluster to Teleport](./agent.mdx) +
+ ## Follow along with our video guide