Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Improve access graph documentation #49314

Merged
merged 4 commits into from
Nov 25, 2024
Merged

Conversation

tigrato
Copy link
Contributor

@tigrato tigrato commented Nov 21, 2024

This PR introduces a recommendation for users to enable Okta/Entra synchronization to improve the user experience when working with Crown Jewels. Ephemeral, highly privileged users created by the SSO connector can generate excessive activity, making Crown Jewels difficult to use.

Additionally, the PR includes examples of the new ssh_keys view when utilizing the Policy SSH Keys scan functionality.

This PR introduces a recommendation for users to enable Okta/Entra synchronization to improve the user experience when working with Crown Jewels. Ephemeral, highly privileged users created by the SSO connector can generate excessive activity, rendering Crown Jewels difficult to use.

Additionally, the PR includes examples of the new `ssh_keys` view when utilizing the Policy SSH Keys scan functionality.

Signed-off-by: Tiago Silva <[email protected]>
Copy link

🤖 Vercel preview here: https://docs-2xfrsnuzd-goteleport.vercel.app/docs

Copy link

🤖 Vercel preview here: https://docs-210e8pqxs-goteleport.vercel.app/docs


For an improved experience, we recommend using Crown Jewels in conjunction with Teleport local users or integrating with
[Okta](../../enroll-resources/application-access/okta/okta.mdx) or [Microsoft Entra ID](./integrations/entra-id.mdx).
This setup helps mitigate the spam generated by highly privileged ephemeral users created by Teleport Auth Connectors.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What does "spam" mean in this case? To me, this sounds a little judgmental towards a Teleport feature, which seems out of place in documentation.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Spam refers to an excessive number of entries. When a user with access to all resources logs in using a standard connector, it generates N access path changes, where N is the number of resources they have access to.

@@ -152,6 +152,30 @@ Insecure paths are also visible in a user's access paths. To view them, click on
from the context menu. This will show the Teleport permissions granted to the user, the resources they can access,
and any detected insecure paths.

**Access Graph: Dedicated `ssh_keys` SQL View**
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If this is a section heading, I would use header syntax (#+) instead of bold text.

@@ -16,7 +16,8 @@ Crown Jewels, and how to see permission changes for these resources.

For an improved experience, we recommend using Crown Jewels in conjunction with Teleport local users or integrating with
[Okta](../../enroll-resources/application-access/okta/okta.mdx) or [Microsoft Entra ID](./integrations/entra-id.mdx).
This setup helps mitigate the spam generated by highly privileged ephemeral users created by Teleport Auth Connectors.
This setup helps minimize the number of access path change entries generated when highly privileged ephemeral users
log in via Teleport Auth Connectors..
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
log in via Teleport Auth Connectors..
log in via Teleport authentication connectors.

To use the convention we use elsewhere in the docs

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Are we being overly pedantic here?

The product literally calls them Auth Connectors:

image

Copy link

🤖 Vercel preview here: https://docs-5pq78tfjb-goteleport.vercel.app/docs

Copy link

🤖 Vercel preview here: https://docs-d7ml5j91w-goteleport.vercel.app/docs

Copy link

🤖 Vercel preview here: https://docs-bzany97mu-goteleport.vercel.app/docs

Comment on lines +19 to +20
This setup helps minimize the number of access path change entries generated when highly privileged ephemeral users
log in via Teleport Auth Connectors.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
This setup helps minimize the number of access path change entries generated when highly privileged ephemeral users
log in via Teleport Auth Connectors.
This setup helps minimize the number of access path change entries generated when ephemeral SSO users
marked as Crown Jewels log in via Teleport Auth Connectors.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

They don't need to be Crown Jewels. Actually the issue is much worse if the resources are Crown Jewels because it generates one event per resource they have access to

Copy link

🤖 Vercel preview here: https://docs-3icfcfail-goteleport.vercel.app/docs

@tigrato tigrato added this pull request to the merge queue Nov 25, 2024
Copy link

🤖 Vercel preview here: https://docs-4hqg9ez3l-goteleport.vercel.app/docs

Merged via the queue into master with commit 4102fa5 Nov 25, 2024
41 checks passed
@tigrato tigrato deleted the tigrato/improve-access-graph-docs branch November 25, 2024 10:04
@public-teleport-github-review-bot

@tigrato See the table below for backport results.

Branch Result
branch/v15 Failed
branch/v16 Create PR
branch/v17 Create PR

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants