|
18 | 18 | "destination": "/hcp/docs/hcp/admin/iam/users", |
19 | 19 | "permanent": true, |
20 | 20 | }, |
| 21 | + // File moved by https://github.com/hashicorp/hcp-docs/pull/966 |
| 22 | + { |
| 23 | + "source": "/hcp/docs/hcp/admin/iam/groups", |
| 24 | + "destination": "/hcp/docs/hcp/iam/groups", |
| 25 | + "permanent": true, |
| 26 | + }, |
| 27 | + { |
| 28 | + "source": "/hcp/iam/sso/default-role", |
| 29 | + "destination": "/hcp/docs/hcp/iam/sso/default-role", |
| 30 | + "permanent": true, |
| 31 | + }, |
21 | 32 | { |
22 | 33 | "source": "/hcp/docs/hcp/security/mfa", |
23 | | - "destination": "/hcp/docs/hcp/admin/iam/mfa", |
| 34 | + "destination": "/hcp/docs/hcp/iam/mfa", |
| 35 | + "permanent": true, |
| 36 | + }, |
| 37 | + { |
| 38 | + "source": "/hcp/docs/hcp/admin/iam/mfa", |
| 39 | + "destination": "/hcp/docs/hcp/iam/mfa", |
| 40 | + "permanent": true, |
| 41 | + }, |
| 42 | + { |
| 43 | + "source": "/hcp/docs/hcp/admin/iam/sso/default-role", |
| 44 | + "destination": "/hcp/docs/hcp/iam/sso/default-role", |
| 45 | + "permanent": true, |
| 46 | + }, |
| 47 | + { |
| 48 | + "source": "/hcp/docs/hcp/admin/iam/sso", |
| 49 | + "destination": "/hcp/docs/hcp/iam/sso", |
24 | 50 | "permanent": true, |
25 | 51 | }, |
26 | 52 | { |
27 | 53 | "source": "/hcp/docs/hcp/security/service-principals", |
28 | 54 | "destination": "/hcp/docs/hcp/admin/iam/service-principals", |
29 | 55 | "permanent": true, |
30 | 56 | }, |
| 57 | + { |
| 58 | + "source": "/hcp/docs/hcp/admin/iam/service-principals", |
| 59 | + "destination": "/hcp/docs/hcp/iam/service-principal", |
| 60 | + "permanent": true, |
| 61 | + }, |
31 | 62 | { |
32 | 63 | "source": "/hcp/docs/hcp/security/sso", |
33 | 64 | "destination": "/hcp/docs/hcp/admin/iam/sso", |
|
38 | 69 | "destination": "/hcp/docs/hcp/admin/iam/sso/sso-okta", |
39 | 70 | "permanent": true, |
40 | 71 | }, |
| 72 | + { |
| 73 | + "source": "/hcp/docs/hcp/admin/iam/sso/sso-okta", |
| 74 | + "destination": "/hcp/docs/hcp/iam/sso", |
| 75 | + "permanent": true, |
| 76 | + }, |
41 | 77 | { |
42 | 78 | "source": "/hcp/docs/hcp/security/sso/sso-okta-oidc", |
43 | 79 | "destination": "/hcp/docs/hcp/admin/iam/sso/sso-okta-oidc", |
44 | 80 | "permanent": true, |
45 | 81 | }, |
| 82 | + { |
| 83 | + "source": "/hcp/docs/hcp/admin/iam/sso/sso-okta-oidc", |
| 84 | + "destination": "/hcp/docs/hcp/iam/sso/setup/oidc", |
| 85 | + "permanent": true, |
| 86 | + }, |
46 | 87 | { |
47 | 88 | "source": "/hcp/docs/hcp/security/sso/sso-aad", |
48 | 89 | "destination": "/hcp/docs/hcp/admin/iam/sso/sso-aad", |
49 | 90 | "permanent": true, |
50 | 91 | }, |
| 92 | + { |
| 93 | + "source": "/hcp/docs/hcp/admin/iam/sso/sso-aad", |
| 94 | + "destination": "/hcp/docs/hcp/iam/sso", |
| 95 | + "permanent": true, |
| 96 | + }, |
51 | 97 | { |
52 | 98 | "source": "/hcp/docs/hcp/security/sso/sso-aad-oidc", |
53 | 99 | "destination": "/hcp/docs/hcp/admin/iam/sso/sso-aad-oidc", |
54 | 100 | "permanent": true, |
55 | 101 | }, |
| 102 | + { |
| 103 | + "source": "/hcp/docs/hcp/admin/iam/sso/sso-aad-oidc", |
| 104 | + "destination": "/hcp/docs/hcp/iam/sso/setup/oidc", |
| 105 | + "permanent": true, |
| 106 | + }, |
56 | 107 | { |
57 | 108 | "source": "/hcp/docs/consul/specifications", |
58 | 109 | "destination": "/hcp/docs/consul", |
|
272 | 323 | "destination": "/hcp/docs/manage/channel", |
273 | 324 | "permanent": true, |
274 | 325 | }, |
| 326 | + { |
| 327 | + "source": "/hcp/docs/manage/channel", |
| 328 | + "destination": "/hcp/docs/packer/manage/channel", |
| 329 | + "permanent": true, |
| 330 | + }, |
275 | 331 | { |
276 | 332 | "source": "/hcp/docs/boundary/self-managed-workers/support-considerations", |
277 | 333 | "destination": "hcp/docs/boundary/support-policy", |
|
367 | 423 | "destination": "/hcp/docs/consul/dedicated/:slug*", |
368 | 424 | "permanent": true, |
369 | 425 | }, |
370 | | - { |
371 | | - "source": "/hcp/docs/hcp/admin/iam/:slug*", |
372 | | - "destination": "/hcp/docs/hcp/iam/:slug*", |
373 | | - "permanent": true, |
374 | | - }, |
| 426 | + // { |
| 427 | + // "source": "/hcp/docs/hcp/admin/iam/:slug*", |
| 428 | + // "destination": "/hcp/docs/hcp/iam/:slug*", |
| 429 | + // "permanent": true, |
| 430 | + // }, |
375 | 431 | { |
376 | 432 | "source": "/hcp/docs/vault-secrets/tiers-and-features", |
377 | 433 | "destination": |
|
384 | 440 | "/hcp/docs/vault-secrets/get-started/plan-implementation/constraints-limitations", |
385 | 441 | "permanent": true, |
386 | 442 | }, |
| 443 | + { |
| 444 | + "source": "/hcp/docs/vault-secrets/get-started/plan-implementation/constraints-limitations", |
| 445 | + "destination": |
| 446 | + "/hcp/docs/vault-secrets/get-started/plan-implementation/constraints-considerations", |
| 447 | + "permanent": true, |
| 448 | + }, |
387 | 449 | { |
388 | 450 | "source": "/hcp/docs/vault-secrets/permissions", |
389 | 451 | "destination": |
|
433 | 495 | "destination": "/hcp/docs/iam/service-principal", |
434 | 496 | "permanent": true, |
435 | 497 | }, |
| 498 | + { |
| 499 | + "source": "/hcp/docs/iam/service-principal", |
| 500 | + "destination": "/hcp/docs/hcp/iam/service-principal", |
| 501 | + "permanent": true, |
| 502 | + }, |
436 | 503 | { |
437 | 504 | "source": "/hcp/docs/security/audit-log/:slug", |
438 | 505 | "destination": "/hcp/docs/audit-log/:slug", |
|
0 commit comments