Skip to content

Commit c00c9e1

Browse files
mmcallisterzmb3
andauthored
[v17] docs: new product messaging for marketing launch (#52959)
* product name changes from marketing * correcting duplications * post-marketing review * review changes * Update docs/pages/admin-guides/infrastructure-as-code/managing-resources/access-list.mdx Co-authored-by: Zac Bergquist <zac.bergquist@goteleport.com> * revisions * cleanup and reverting use-cases of 'Zero Trust Access x' * Trust Access corrections * removing 2 images already in master * post-feedback changes * Update docs/pages/admin-guides/teleport-policy/teleport-policy.mdx Co-authored-by: Zac Bergquist <zac.bergquist@goteleport.com> * post G2 review feedback * Lint helm appeasement * adding two images from marketing * moving 2 images to getting-started directory --------- Co-authored-by: Zac Bergquist <zac.bergquist@goteleport.com>
1 parent 96138d6 commit c00c9e1

File tree

66 files changed

+149
-156
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

66 files changed

+149
-156
lines changed

docs/pages/admin-guides/access-controls/access-monitoring.mdx

+2-2
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ Users are able to write their own custom access monitoring queries by querying t
3131
<Tabs>
3232
<TabItem scope={["cloud","team"]} label="Teleport Enterprise (cloud-hosted)">
3333

34-
Teleport Access Monitoring is enabled by default for all Teleport Enterprise (cloud-hosted) accounts.
34+
Access Monitoring is enabled by default for all Teleport Enterprise (cloud-hosted) accounts.
3535

3636
</TabItem>
3737
<TabItem scope={["enterprise", "oss"]} label="Self-Hosted">
@@ -181,7 +181,7 @@ spec:
181181

182182
## Query Editor
183183

184-
The Query Editor in Teleport Access Monitoring provides users with an interface to interactively query audit logs and generate reports.
184+
The Query Editor in Access Monitoring provides users with an interface to interactively query audit logs and generate reports.
185185
Users can write custom SQL queries for these views to build custom reports akin to querying a relational database.
186186

187187
Within the Query Editor, users have access to a number of SQL views representing audit events captured by Teleport.

docs/pages/admin-guides/access-controls/access-request-plugins/datadog-hosted.mdx

+2-2
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ The Teleport Datadog Incident Management integration connects to the Teleport
1919
gRPC API and listens for Role Access Requests. When the integration receives a
2020
status change for a Role Access Request, it either creates a new incident in
2121
Datadog or, if an incident exists, updates it. The integration also reads
22-
annotations on each Teleport Access Request and, depending on the annotations,
22+
annotations on each Access Request and, depending on the annotations,
2323
may approve the Access Request automatically.
2424

2525
## Prerequisites
@@ -124,7 +124,7 @@ to view your organization's service accounts. To create a new service account, c
124124
on **New Service Account** and name it "Teleport Access". You can provide whatever
125125
email you'd like to associate with the service account, then assign the role
126126
"Datadog Standard Role". This role provides the required permissions necessary to
127-
manage the Teleport Access Request incidents.
127+
manage the incidents in Datadog.
128128

129129
![Datadog dashboard for Service Accounts](../../../../img/enterprise/plugins/datadog/dashboard-service-accounts.png)
130130

docs/pages/admin-guides/access-controls/access-request-plugins/ssh-approval-email.mdx

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Teleport Access Requests with Email
2+
title: Access Requests with Email
33
description: How to set up the Teleport email plugin to notify users when another user requests elevated privileges.
44
---
55

docs/pages/admin-guides/access-controls/access-request-plugins/ssh-approval-jira.mdx

+3-4
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: How to set up the Teleport Jira plugin to notify users when another
44
---
55

66
This guide explains how to set up the Teleport Access Request plugin for Jira.
7-
Teleport's Jira integration allows you to manage Teleport Access Requests as
7+
Teleport's Jira integration allows you to manage Access Requests as
88
Jira issues.
99

1010
The Teleport Jira plugin synchronizes a Jira project board with the Access
@@ -139,7 +139,7 @@ Click **Back to board** to review your changes.
139139

140140
### Retrieve your Jira API token
141141

142-
Obtain an API token that the Teleport Access Request plugin uses to make
142+
Obtain an API token that the Access Request plugin uses to make
143143
changes to your Jira project. Click the gear menu at the upper right of the
144144
screen, then click **Atlassian account settings**. Click **Security** >
145145
**Create and manage API tokens** > **Create API token**.
@@ -385,8 +385,7 @@ Access Request:
385385

386386
(!docs/pages/includes/plugins/create-request.mdx!)
387387

388-
When you create the request, you will see a new task in the "Pending" column of
389-
the Teleport Access Requests board:
388+
When you create the request, you will see a new task in the "Pending" column of the Access Requests board:
390389

391390
![New Access Request](../../../../img/enterprise/plugins/jira/new-request.png)
392391

docs/pages/admin-guides/access-controls/access-request-plugins/ssh-approval-mattermost.mdx

+1-1
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ description: How to set up Teleport's Mattermost plugin for privilege elevation
55

66
import BotLogo from "/static/avatar_logo.png";
77

8-
This guide explains how to integrate Teleport Access Requests with Mattermost, an open
8+
This guide explains how to integrate Access Requests with Mattermost, an open
99
source messaging platform. The Teleport Mattermost plugin notifies individuals of
1010
Access Requests. Users can then approve and deny Access Requests by following the
1111
message link, making it easier to implement security best practices without

docs/pages/admin-guides/access-controls/access-requests/access-requests.mdx

+1-1
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ consider [Access Lists](../access-lists/access-lists.mdx).
2020

2121
## See how Access Requests work
2222

23-
Teleport Access Requests support two main use cases: **Role Access Requests**
23+
Access Requests support two main use cases: **Role Access Requests**
2424
and **Resource Access Requests**.
2525

2626
With Role Access Requests, engineers can request temporary credentials with

docs/pages/admin-guides/access-controls/access-requests/resource-requests.mdx

+1-2
Original file line numberDiff line numberDiff line change
@@ -307,8 +307,7 @@ below, edit one of the user's roles so the `search_as_roles` field includes the
307307
role you have created.
308308

309309
For full details on how to use Teleport roles to configure RBAC, see the
310-
[Teleport Access Controls
311-
Reference](../../../reference/access-controls/roles.mdx).
310+
[Access Controls Reference](../../../reference/access-controls/roles.mdx).
312311

313312
#### `node`
314313

docs/pages/admin-guides/access-controls/device-trust/guide.mdx

+1-1
Original file line numberDiff line numberDiff line change
@@ -153,6 +153,6 @@ Device Trust enforcement.
153153
- The role we illustrated in this guide uses the `internal.logins` trait,
154154
which Teleport replaces with values from the Teleport local user
155155
database. For full details on how traits work in Teleport roles,
156-
see the [Teleport Access Controls
156+
see the [Access Controls
157157
Reference](../../../reference/access-controls/roles.mdx).
158158

docs/pages/admin-guides/access-controls/getting-started.mdx

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Getting Started With Access Controls
3-
description: Get started using Teleport Access Controls.
3+
description: Get started using Access Controls.
44
---
55

66
In Teleport, any local, SSO, or robot user can be assigned one or several roles.

docs/pages/admin-guides/access-controls/sso/adfs.mdx

+1-1
Original file line numberDiff line numberDiff line change
@@ -208,6 +208,6 @@ automatically in a browser.
208208
In the Teleport role we illustrated in this guide, `external` traits
209209
are replaced with values from the single sign-on provider that the user
210210
used to authenticate to Teleport. For full details on how traits
211-
work in Teleport roles, see the [Teleport Access Controls
211+
work in Teleport roles, see the [Access Controls
212212
Reference](../../../reference/access-controls/roles.mdx).
213213

docs/pages/admin-guides/access-controls/sso/azuread.mdx

+1-1
Original file line numberDiff line numberDiff line change
@@ -413,6 +413,6 @@ Change the Name ID format to use email instead:
413413
- In the Teleport role we illustrated in this guide, `external` traits
414414
are replaced with values from the single sign-on provider that the
415415
user used to authenticate to Teleport. For full details on how traits
416-
work in Teleport roles, see the [Teleport Access Controls
416+
work in Teleport roles, see the [Access Controls
417417
Reference](../../../reference/access-controls/roles.mdx).
418418

docs/pages/admin-guides/access-controls/sso/github-sso.mdx

+1-1
Original file line numberDiff line numberDiff line change
@@ -481,6 +481,6 @@ shows the slug is `my-team`. Update the teams to roles mapping.
481481
The role we illustrated in this guide uses the `internal.logins` trait,
482482
which Teleport replaces with values from the Teleport local user
483483
database. For full details on how traits work in Teleport roles,
484-
see the [Teleport Access Controls
484+
see the [Access Controls
485485
Reference](../../../reference/access-controls/roles.mdx).
486486

docs/pages/admin-guides/access-controls/sso/gitlab.mdx

+1-1
Original file line numberDiff line numberDiff line change
@@ -178,7 +178,7 @@ spec:
178178
*"email"* GitLab claim and use that field as an allowed login for each user.
179179
The `email.local(external.trait)` function removes the `@domain` and preserves
180180
the username prefix. For full details on how variable expansion works in
181-
Teleport roles, see the [Teleport Access Controls
181+
Teleport roles, see the [Access Controls
182182
Reference](../../../reference/access-controls/roles.mdx).
183183
- Developers also do not have any "allow rules" i.e. they will not be able to
184184
see/replay past sessions or re-configure the Teleport cluster.

docs/pages/admin-guides/access-controls/sso/okta.mdx

+1-1
Original file line numberDiff line numberDiff line change
@@ -235,7 +235,7 @@ Notice the `{{external.username}}` login. It configures Teleport to look at the
235235
This example uses email as the username format. The
236236
`email.local(external.username)` function call will remove the `@domain` and
237237
leave the username prefix. For full details on how variable expansion works in
238-
Teleport roles, see the [Teleport Access Controls
238+
Teleport roles, see the [Access Controls
239239
Reference](../../../reference/access-controls/roles.mdx).
240240

241241
Use `tctl` to create this role in the Teleport Auth Service:

docs/pages/admin-guides/access-controls/sso/one-login.mdx

+1-1
Original file line numberDiff line numberDiff line change
@@ -168,6 +168,6 @@ $ tctl create -f dev.yaml
168168
In the Teleport role we illustrated in this guide, `external` traits
169169
are replaced with values from the single sign-on provider that the user
170170
used to authenticate to Teleport. For full details on how traits
171-
work in Teleport roles, see the [Teleport Access Controls
171+
work in Teleport roles, see the [Access Controls
172172
Reference](../../../reference/access-controls/roles.mdx).
173173

docs/pages/admin-guides/access-controls/sso/sso.mdx

+1-1
Original file line numberDiff line numberDiff line change
@@ -663,5 +663,5 @@ version: v5
663663
The roles we illustrated in this guide use `external` traits,
664664
which Teleport replaces with values from the single sign-on provider that the
665665
user used to authenticate with Teleport. For full details on how variable
666-
expansion works in Teleport roles, see the [Teleport Access Controls
666+
expansion works in Teleport roles, see the [Access Controls
667667
Reference](../../../reference/access-controls/roles.mdx).

docs/pages/admin-guides/api/access-plugin.mdx

+1-1
Original file line numberDiff line numberDiff line change
@@ -357,7 +357,7 @@ so, it calls `createRow`. If not, it calls `updateSpreadsheet`.
357357
The Teleport API client type, `client.Client`, has a `NewWatcher` method that
358358
listens for new audit events from the Auth Service API via a gRPC stream. The
359359
second parameter of the method indicates the type of audit event to watch for,
360-
in this case, events having to do with Teleport Access Requests.
360+
in this case, events having to do with Access Requests.
361361

362362
The result of `NewWatcher`, a `types.Watcher`, enables `Run` to respond to new
363363
audit events by calling the `Events` method. This returns a Go **channel**, a

docs/pages/admin-guides/deploy-a-cluster/access-graph/access-graph.mdx

+3-3
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: "Self-Hosting Teleport Access Graph"
3-
description: Explains how to deploy Teleport Access Graph alongside a self-hosted Teleport cluster.
3+
description: Explains how to deploy Access Graph alongside a self-hosted Teleport cluster.
44
---
55

6-
If you run a self-hosted Teleport cluster, using Teleport Access Graph (part of
7-
Teleport Policy) requires running the Access Graph Service on your own
6+
If you run a self-hosted Teleport cluster, using Access Graph (part of
7+
Teleport Identity Security) requires running the Access Graph Service on your own
88
infrastructure. The following guides show you how to deploy the Access Graph
99
Service.
1010

docs/pages/admin-guides/deploy-a-cluster/access-graph/self-hosted-helm.mdx

+4-4
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
---
2-
title: Run Teleport Policy's Access Graph feature on Self-Hosted Clusters with Helm
2+
title: Run Teleport Identity Security with Access Graph on Self-Hosted Clusters with Helm
33
description: How to deploy Access Graph on self-hosted clusters using Helm.
44
---
55

6-
Using Teleport Policy's Access Graph with a self-hosted Teleport cluster requires
6+
Using Teleport Identity Security with Access Graph on a self-hosted Teleport cluster requires
77
setting up the Access Graph, a dedicated service which uses PostgreSQL
88
as its backing storage and communicates with Auth Service and Proxy Service
99
to collect information about resources and access.
@@ -13,7 +13,7 @@ and enable the Access Graph feature in your Teleport cluster.
1313

1414
The full listing of supported parameters can be found in the [Helm chart reference](../../../reference/helm-reference/teleport-access-graph.mdx).
1515

16-
Access Graph is a feature of the [Teleport Policy](https://goteleport.com/platform/policy/) product that is only available
16+
Access Graph is a feature of the [Identity Security](https://goteleport.com/platform/policy/) product that is only available
1717
to Teleport Enterprise customers.
1818

1919
## Prerequisites
@@ -24,7 +24,7 @@ to Teleport Enterprise customers.
2424
- For the purposes of this guide, we assume that the Teleport cluster is set up
2525
[using the `teleport-cluster` Helm chart](../helm-deployments/helm-deployments.mdx)
2626
in the same Kubernetes cluster that will be used to deploy Access Graph.
27-
- An updated `license.pem` with Teleport Policy enabled.
27+
- An updated `license.pem` with Identity Security enabled.
2828
- A PostgreSQL database server v14 or later.
2929
- Access Graph needs a dedicated [database](https://www.postgresql.org/docs/current/sql-createdatabase.html) to store its data.
3030
The user that Teleport connects to the database with needs to be the owner of this database, or have similar broad permissions:

docs/pages/admin-guides/deploy-a-cluster/access-graph/self-hosted.mdx

+3-3
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
---
2-
title: Run Teleport Policy on Self-Hosted Clusters
2+
title: Run Teleport Identity Security on Self-Hosted Clusters
33
description: Describes how to deploy Access Graph on self-hosted clusters.
44
---
55

6-
Teleport Policy's Access Graph with a self-hosted Teleport cluster requires setting up
6+
Identity Security with Access Graph on a self-hosted Teleport cluster requires setting up
77
Access Graph, a dedicated service which uses PostgreSQL as its backing storage and communicates
88
with Auth Service and Proxy Service to collect information about resources and access.
99

@@ -12,7 +12,7 @@ This guide will help you set up the service and enable Access Graph in your Tele
1212
## Prerequisites
1313

1414
- A running Teleport Enterprise cluster v14.3.6 or later.
15-
- An updated `license.pem` with Teleport Policy enabled.
15+
- An updated `license.pem` with Identity Security enabled.
1616
- Docker version v(=docker.version=) or later.
1717
- A PostgreSQL database server v14 or later.
1818
- Access Graph needs a dedicated [database](https://www.postgresql.org/docs/current/sql-createdatabase.html) to store its data.

docs/pages/admin-guides/infrastructure-as-code/infrastructure-as-code.mdx

+1-1
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ Operator by following:
6969
- the ["Registering Agentless OpenSSH Servers with IaC" guide](managing-resources/agentless-ssh-servers.mdx)
7070

7171
For more information on Teleport roles, including the `internal.logins`
72-
trait we use in these example roles, see the [Teleport Access
72+
trait we use in these example roles, see the [Access
7373
Controls Reference](../../reference/access-controls/roles.mdx).
7474

7575
### YAML documents with `tctl`

docs/pages/admin-guides/infrastructure-as-code/managing-resources/access-list.mdx

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Creating Access Lists with IaC
3-
description: Use Infrastructure-as-Code tooling to create Teleport AccessLists.
3+
description: Use Infrastructure-as-Code tooling to create Access Lists.
44
---
55

66
Access Lists allow Teleport users to be granted long-term access to resources

docs/pages/admin-guides/infrastructure-as-code/terraform-starter/terraform-starter.mdx

+1-1
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ provided to each Agent.
2626
Part Two of the Terraform starter module shows you how to configure Teleport
2727
role-based access controls to provide different levels of access to the
2828
resources you enrolled in Part One. It also configures Access Requests,
29-
available in Teleport Identity, so that users authenticate with less privileged
29+
available in Teleport Identity Governance, so that users authenticate with less privileged
3030
roles by default but can request access to more privileged roles. An
3131
authentication connector lets users authenticate to Teleport using a Single
3232
Sign-On provider.

docs/pages/admin-guides/management/admin/trustedclusters.mdx

+1-1
Original file line numberDiff line numberDiff line change
@@ -695,7 +695,7 @@ node_labels:
695695
```
696696

697697
For full details on how variable expansion works in Teleport roles, see the
698-
[Teleport Access Controls
698+
[Access Controls
699699
Reference](../../../reference/access-controls/roles.mdx).
700700

701701
### Update role mappings

docs/pages/admin-guides/management/guides/aws-iam-identity-center.mdx

+2-5
Original file line numberDiff line numberDiff line change
@@ -7,9 +7,7 @@ Teleport's integration with [AWS IAM Identity Center](https://aws.amazon.com/iam
77
allows you to organize and manage your users' short- and long-term access to AWS
88
accounts and their permissions.
99

10-
With the Identity Center integration you can grant or revoke persistent access
11-
to AWS accounts and resources using Teleport Access Lists, or use Teleport
12-
Access Requests for scenarios requiring temporary elevated AWS privileges.
10+
With the AWS Identity Center integration, you can manage AWS access by granting short term or long term access with Identity Governance.
1311

1412
## How it works
1513

@@ -266,8 +264,7 @@ regardless of when the user assumes the associated role(s).
266264

267265
### Just-in-time access with role Access Requests
268266

269-
For short-term privilege elevation, Identity Center integration works with
270-
Teleport Access Requests.
267+
The Identity Center integration allows Teleport users to submit Access Requests for short-term privilege elevation.
271268

272269
When an Access Request for a role granting Identity Center privileges is
273270
approved, Teleport creates an individual assignment for that user in the

docs/pages/admin-guides/management/security/reduce-blast-radius.mdx

+1-1
Original file line numberDiff line numberDiff line change
@@ -222,6 +222,6 @@ Two `user`s can grant elevated privileges to another `user` temporarily without
222222
- [Auth Service](../../../reference/architecture/authentication.mdx)
223223
- The roles we illustrated in this guide use `internal` traits, which Teleport
224224
replaces with values from the Teleport local user database. For full details
225-
on how variable expansion works in Teleport roles, see the [Teleport Access
225+
on how variable expansion works in Teleport roles, see the [Access
226226
Controls Reference](../../../reference/access-controls/roles.mdx).
227227

docs/pages/admin-guides/teleport-policy/crown-jewels.mdx

+2-2
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ log in via Teleport Auth Connectors.
2222
</Admonition>
2323

2424
- A running Teleport Enterprise cluster v16.2.0 or later.
25-
- For self-hosted clusters, an updated `license.pem` with Teleport Policy enabled.
25+
- For self-hosted clusters, an updated `license.pem` with Teleport Identity Security enabled.
2626
- For self-hosted clusters, a running Access Graph node v1.24.0 or later.
2727
Check [Access Graph page](teleport-policy.mdx) for details on
2828
how to set up Access Graph.
@@ -50,7 +50,7 @@ version: v7
5050
## Creating a Crown Jewel
5151
5252
To create a Crown Jewel, you need to mark a resource or user as critical. Only changes to marked resources
53-
and users will be logged by Teleport Policy.
53+
and users will be logged by Identity Security.
5454
To mark a resource or user as Crown Jewel, open the Access Graph and navigate to the "Crown Jewels" tab.
5555
5656
![Create Page](../../../img/access-graph/crown-jewels/create-page.webp)

docs/pages/admin-guides/teleport-policy/integrations/aws-sync.mdx

+8-8
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Discover AWS Access Patterns with Teleport Policy
3-
description: Describes how to import and visualize AWS accounts access patterns using Teleport Policy and Access Graph.
2+
title: Discover AWS Access Patterns with Teleport Identity Security
3+
description: Describes how to import and visualize AWS accounts access patterns using Identity Security and Access Graph.
44
---
55

6-
Teleport Policy streamlines and centralizes access management across your entire infrastructure. You can view access relationships in seconds,
6+
Identity Security streamlines and centralizes access management across your entire infrastructure. You can view access relationships in seconds,
77
viewing unified, up-to-date relationships and policies between all users, groups, and computing resources.
88

9-
Teleport Policy with Access Graph offers insights into access patterns within your AWS account. By scanning IAM
9+
Identity Security with Access Graph offers insights into access patterns within your AWS account. By scanning IAM
1010
permissions, users, groups, resources, and identities, it provides a visual representation and aids in
1111
enhancing the permission model within your AWS environment. This functionality enables you to address queries such as:
1212

@@ -24,7 +24,7 @@ service, a Discovery Service, and integration with your AWS account.
2424
Access Graph discovers AWS access patterns, synchronizes various AWS resources,
2525
including IAM Policies, Groups, Users, User Groups, EC2 instances, EKS clusters, and RDS databases.
2626
These resources are then visualized using the graph representation detailed in the
27-
[Teleport Policy usage page](../policy-how-to-use.mdx).
27+
[Identity Security usage page](../policy-how-to-use.mdx).
2828

2929
The importing process involves two primary steps:
3030

@@ -48,19 +48,19 @@ Access Graph, ensuring that it remains updated with the latest information from
4848

4949
### Importing resources
5050

51-
Teleport Policy’s Access Graph feature delves into the IAM policies, identities,
51+
Identity Security’s Access Graph feature delves into the IAM policies, identities,
5252
and resources retrieved from your AWS account, crafting a
5353
graphical representation thereof.
5454

5555

5656
## Prerequisites
5757

5858
- A running Teleport Enterprise cluster v14.3.9/v15.2.0 or later.
59-
- Teleport Policy enabled for your account.
59+
- Identity Security enabled for your account.
6060
- For self-hosted clusters:
6161
- Ensure that an up-to-date `license.pem` is used in the Auth Service configuration.
6262
- A running Access Graph node v1.17.0 or later.
63-
Check the [Teleport Policy page](../teleport-policy.mdx) for details on
63+
Check the [Identity Security page](../teleport-policy.mdx) for details on
6464
how to set up Access Graph.
6565
- The node running the Access Graph service must be reachable from the Teleport Auth Service.
6666

0 commit comments

Comments
 (0)