Skip to content

Commit 010af1c

Browse files
emlanctothelenjw
authored andcommitted
docs: fix typos and add specificity
1 parent 602dca3 commit 010af1c

File tree

2 files changed

+7
-7
lines changed

2 files changed

+7
-7
lines changed

content/terraform-docs-common/docs/cloud-docs/api-docs/organizations.mdx

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,7 @@ curl \
135135
"two-factor-conformant": false,
136136
"assessments-enforced": false,
137137
"default-execution-mode": "remote",
138-
"user-tokens-enabled: true
138+
"user-tokens-enabled": true
139139
},
140140
"relationships": {
141141
"default-agent-pool": {
@@ -225,7 +225,7 @@ curl \
225225
"two-factor-conformant": false,
226226
"assessments-enforced": false,
227227
"default-execution-mode": "remote",
228-
"user-tokens-enabled: true
228+
"user-tokens-enabled": true
229229
},
230230
"relationships": {
231231
"default-agent-pool": {
@@ -361,7 +361,7 @@ curl \
361361
"two-factor-conformant": false,
362362
"assessments-enforced": false,
363363
"default-execution-mode": "remote",
364-
"user-tokens-enabled: true
364+
"user-tokens-enabled": true
365365
},
366366
"relationships": {
367367
"default-agent-pool": {
@@ -517,7 +517,7 @@ curl \
517517
"two-factor-conformant": false,
518518
"assessments-enforced": false,
519519
"default-execution-mode": "remote",
520-
"user-tokens-enabled: true
520+
"user-tokens-enabled": true
521521
},
522522
"relationships": {
523523
"default-agent-pool": {
@@ -709,7 +709,7 @@ curl \
709709
"two-factor-conformant": false,
710710
"assessments-enforced": false,
711711
"default-execution-mode": "remote",
712-
"user-tokens-enabled: true
712+
"user-tokens-enabled": true
713713
},
714714
"relationships": {
715715
"default-agent-pool": {

content/terraform-docs-common/docs/cloud-docs/users-teams-organizations/api-tokens.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ API tokens may belong directly to a user. User tokens are the most flexible toke
1818

1919
### Disabling user tokens for organizations
2020

21-
When user tokens are disabled for an organization, all user tokens will be blocked from accessing organization resources. By default, user tokens are enabled for organizations.
21+
When user tokens are disabled for an organization, all user tokens will be blocked from accessing organization resources on the API. By default, user tokens are enabled for organizations.
2222

2323
1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise, then navigate to the organization where you want to disable user tokens.
2424
1. Choose **Settings** from the sidebar, then **API tokens**.
@@ -29,7 +29,7 @@ When user tokens are disabled for an organization, all user tokens will be block
2929

3030
!> **Warning:** Use caution disabling user tokens for an organization. This could cause automation to fail if the automation is using user tokens to authenticate.
3131

32-
-> **Note:** When user tokens are disabled for an organization, that organization should use `oauth-token-id` to configure their VCS connections rather than `github-app-installation-id`, as the latter relies on user tokens to authenticate to Github.
32+
-> **Note:** When user tokens are disabled for an organization, that organization should use **Github (OAuth)** to configure their VCS connections rather than **Github (App)**, as the latter relies on user tokens to authenticate to Github.
3333

3434
## Team API Tokens
3535

0 commit comments

Comments
 (0)