Skip to content

Commit ef9c2c5

Browse files
authored
Merge branch 'main' into TF-31754-document-list-projects-api-tag-filter-parameters
2 parents 9c750c3 + 83579bd commit ef9c2c5

File tree

11,731 files changed

+1660020
-219
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

11,731 files changed

+1660020
-219
lines changed

.gitignore

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -61,3 +61,6 @@ tfe-releases-repos.json
6161
scripts/prebuild/prebuild-arm-mac-binary
6262
scripts/prebuild/prebuild-x64-linux-binary
6363
scripts/prebuild/prebuild-arm-linux-binary
64+
65+
# GA to RC tool output files
66+
scripts/sync-ga-to-rc/output/*.txt

CODEOWNERS

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,11 @@
55
/docs @hashicorp/vault-education-approvers @hashicorp/education
66

77
# Terraform documentation ownership
8-
/content/terraform-plugin-framework @hashicorp/terraform-devex @hashicorp/terraform-education
9-
/content/terraform-plugin-log @hashicorp/terraform-devex @hashicorp/terraform-education
10-
/content/terraform-plugin-mux @hashicorp/terraform-devex @hashicorp/terraform-education
11-
/content/terraform-plugin-sdk @hashicorp/terraform-devex @hashicorp/terraform-education
12-
/content/terraform-plugin-testing @hashicorp/terraform-devex @hashicorp/terraform-education
8+
/content/terraform-plugin-framework @hashicorp/terraform-core-plugins @hashicorp/terraform-education
9+
/content/terraform-plugin-log @hashicorp/terraform-core-plugins @hashicorp/terraform-education
10+
/content/terraform-plugin-mux @hashicorp/terraform-core-plugins @hashicorp/terraform-education
11+
/content/terraform-plugin-sdk @hashicorp/terraform-core-plugins @hashicorp/terraform-education
12+
/content/terraform-plugin-testing @hashicorp/terraform-core-plugins @hashicorp/terraform-education
1313
/content/terraform-docs-agents @hashicorp/team-hcpt-agent-engineering
1414
/content/terraform-mcp-server @hashicorp/team-docs-packer-and-terraform
1515
/content/terraform-migrate @hashicorp/team-docs-packer-and-terraform
@@ -22,8 +22,8 @@
2222
/content/terraform/*/docs/language/backend/s3.mdx @hashicorp/terraform-education @hashicorp/terraform-core @hashicorp/team-docs-packer-and-terraform @hashicorp/terraform-aws
2323

2424
/content/terraform-docs-common/ @hashicorp/team-docs-packer-and-terraform
25-
/content/terraform-docs-common/docs/plugin/ @hashicorp/terraform-devex
26-
/content/terraform-docs-common/data/plugin-nav-data.json @hashicorp/terraform-devex
25+
/content/terraform-docs-common/docs/plugin/ @hashicorp/terraform-core-plugins
26+
/content/terraform-docs-common/data/plugin-nav-data.json @hashicorp/terraform-core-plugins
2727

2828
/content/terraform-enterprise @hashicorp/team-docs-packer-and-terraform @hashicorp/ptfe-review
2929

content/boundary/v0.12.x/content/docs/concepts/domain-model/credential-libraries.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ The example above uses the account email, but it could be any other parameter.
105105

106106
## Tutorial
107107

108-
Refer to the [SSH certificate injection with HCP Boundary](/boundary/tutorials/access-management/hcp-certificate-injection) tutorial to learn how to configure credential injection with SSH certificates using Vault.
108+
Refer to the [SSH certificate injection with HCP Boundary](/boundary/tutorials/credential-management/hcp-certificate-injection) tutorial to learn how to configure credential injection with SSH certificates using Vault.
109109

110110
## Referenced by
111111

content/boundary/v0.12.x/content/docs/troubleshoot/faq.mdx

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -10,52 +10,52 @@ description: |-
1010
Boundary workers require inbound access from clients. This does not necessarily require that workers be exposed to the public internet.
1111
If the client is coming from a private network (eg a corporate network), the worker needs to allow connectivity from the private network.
1212
If the client is coming from the public internet, the worker needs to allow connectivity from the public internet. For more information,
13-
check out the [worker networking requirements](/hcp/docs/boundary/self-managed-workers).
13+
check out the [worker networking requirements](https://developer.hashicorp.com/hcp/docs/boundary/self-managed-workers).
1414

1515
#### Q: Does Boundary require Vault? What is the integration story?
1616
While Vault isn't a *required* secrets backend for Boundary sessions, the potential for Boundary | Vault integration is a core part of Boundary's overall
1717
value proposition for identity-based access.There are three primary points of integration with Vault:
1818
1. Vault can be used as a secrets backend for Boundary, offering single signon to end target systems via credential brokering. This was covered in Boundary's
1919
[0.4 announcement](https://www.hashicorp.com/blog/announcing-hashicorp-boundary-0-4) and there are ample
20-
[tutorials](/boundary/tutorials/access-management/oss-vault-cred-brokering-quickstart) of this scenario.
20+
[tutorials](/boundary/tutorials/credential-management/community-vault-cred-brokering-quickstart) of this scenario.
2121
2. Boundary can use Vault as an OIDC provider to enable sign-in with Vault's supported auth methods (even non-OIDC auth methods like Active Directory kerberos/LDAP).
2222
This scenario is walked through in this [tutorial](/vault/tutorials/auth-methods/oidc-identity-provider).
2323
3. OSS Boundary can use Vault as the external KMS that serves as Boundary's root of trust. More information on this use case can be found
2424
[here](/boundary/docs/configuration/kms/transit).
2525

2626
#### Q: What Identity Providers does Boundary Support?
27-
Boundary supports [OIDC authentication](/boundary/tutorials/access-management/oidc-auth), which allows support for many popular IdPs
27+
Boundary supports [OIDC authentication](/boundary/tutorials/identity-management/oidc-auth0), which allows support for many popular IdPs
2828
like Okta, Azure AD, Auth0, etc. For non-OIDC authentication protocols (such as LDAP), users can also log in with an OIDC bridge identity provider
29-
such as [Vault's OIDC bridge](/vault/docs/concepts/oidc-provider) capabilities released in 1.9, [Dex](https://dexidp.io), or various others.
29+
such as [Vault's OIDC bridge](https://developer.hashicorp.com/vault/docs/concepts/oidc-provider) capabilities released in 1.9, [Dex](https://dexidp.io), or various others.
3030

3131
#### Q: Does Boundary support Multi-factor Authentication (MFA)?
3232
Boundary Open-ID Connect (OIDC)-based authentication supports MFA if the IdP being used enforces MFA. This allows users to authenticate with an identity
3333
provider supporting MFA, such as Azure AD, Okta, Auth0, etc.
3434
Boundary also supports syncing permission claims between an IDP-managed identity and Boundary. This can be very useful when you want to sync group memberships
35-
from an IDP to Boundary to assign role assignments dynamically. See Boundary's [managed groups capabilities](/boundary/tutorials/configuration/oidc-idp-groups).
35+
from an IDP to Boundary to assign role assignments dynamically. See Boundary's [managed groups capabilities](/boundary/tutorials/identity-management/oidc-idp-groups).
3636

3737
#### Q: Does Boundary automate the discovery and configuration of new targets (e.g. servers)? What happens if a host IP address changes?
3838
Yes, this is one of the core competencies of Boundary. Boundary can discover new targets in two primary ways
3939
1. Boundary's [Terraform provider](https://registry.terraform.io/providers/hashicorp/boundary/latest/docs) supports discovery of targets provisioned by Terraform
40-
2. Boundary's [dynamic host catalog](/boundary/tutorials/access-management/aws-host-catalogs)
40+
2. Boundary's [dynamic host catalog](/boundary/docs/concepts/service-discovery)
4141
agentlessly queries infrastructure providers to automate the onboarding and configuration of hosts
4242

4343
All of these methods will automate the discovery and configuration of targets when their ip addresses change. Of course, static hosts can still be manually added via Boundary admin UI and CLI.
4444

4545
For more information on dynamic host catalogs, please see:
46-
- [Dynamic Host Catalog on AWS](/boundary/tutorials/access-management/aws-host-catalogs)
47-
- [Dynamic Host Catalogs on Azure](/boundary/tutorials/access-management/azure-host-catalogs)
46+
- [Dynamic host catalogs on AWS](/boundary/tutorials/host-management/aws-host-catalogs)
47+
- [Dynamic host catalogs on Azure](/boundary/tutorials/host-management/azure-host-catalogs)
4848

4949
#### Q: Session management capabilities - Does Boundary support live session monitoring and termination?
5050
**Session Logging/Monitoring:** Supported. Boundary creates a session log of all sessions created between identities and targets that have been onboarded to
51-
Boundary. You can learn how to monitor these sessions in this [tutorial](/boundary/tutorials/getting-started/getting-started-connect#manage-sessions).
52-
Boundary supports audit logs for [Boundary OSS](/boundary/tutorials/oss-configuration/event-logging) and [audit log streaming](/hcp/docs/boundary/audit-logging)
51+
Boundary. You can learn how to monitor these sessions in this [tutorial](/boundary/tutorials/community-administration/community-manage-sessions).
52+
Boundary supports audit logs for [Boundary OSS](/boundary/tutorials/self-managed-deployment/event-logging) and [audit log streaming](https://developer.hashicorp.com/hcp/docs/boundary/audit-logging)
5353
for HCP Boundary. Audit logs for both distributions can be exported to SIEM or BI tools.
5454

5555
**Session Termination:** Supported. Session termination for Boundary administrators is a supported capability, as demonstrated in this
56-
[tutorial](/boundary/tutorials/getting-started/getting-started-connect#manage-sessions).
56+
[tutorial](/boundary/tutorials/community-administration/community-manage-sessions).
5757

5858
#### Q: As an AWS user, can IAM roles be used to configure Boundary's dynamic host catalog?
5959
At this time, it is not possible to configure Boundary's dynamic host catalog using IAM roles.
6060
You can configure the dynamic host catalog using an IAM user, however.
61-
For more information, refer to the [Dynamic host catalogs on AWS](/boundary/tutorials/access-management/aws-host-catalogs) tutorial.
61+
For more information, refer to the [Dynamic host catalogs on AWS](/boundary/tutorials/host-management/aws-host-catalogs) tutorial.

content/boundary/v0.13.x/content/docs/concepts/domain-model/credential-libraries.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ The example above uses the account email, but it could be any other parameter.
109109

110110
## Tutorial
111111

112-
Refer to the [SSH certificate injection with HCP Boundary](/boundary/tutorials/access-management/hcp-certificate-injection) tutorial to learn how to configure credential injection with SSH certificates using Vault.
112+
Refer to the [SSH certificate injection with HCP Boundary](/boundary/tutorials/credential-management/hcp-certificate-injection) tutorial to learn how to configure credential injection with SSH certificates using Vault.
113113

114114
## Referenced by
115115

content/boundary/v0.13.x/content/docs/troubleshoot/faq.mdx

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -14,58 +14,58 @@ Refer to the following for answers to frequently asked questions about Boundary.
1414
Boundary workers require inbound access from clients. This does not necessarily require that workers be exposed to the public internet.
1515
If the client is coming from a private network (eg a corporate network), the worker needs to allow connectivity from the private network.
1616
If the client is coming from the public internet, the worker needs to allow connectivity from the public internet. For more information,
17-
check out the [worker networking requirements](/hcp/docs/boundary/self-managed-workers).
17+
check out the [worker networking requirements](https://developer.hashicorp.com/hcp/docs/boundary/self-managed-workers).
1818

1919
## Q: Does Boundary require Vault? What is the integration story?
2020

2121
While Vault isn't a *required* secrets backend for Boundary sessions, the potential for Boundary | Vault integration is a core part of Boundary's overall
2222
value proposition for identity-based access.There are three primary points of integration with Vault:
2323
1. Vault can be used as a secrets backend for Boundary, offering single signon to end target systems via credential brokering. This was covered in Boundary's
2424
[0.4 announcement](https://www.hashicorp.com/blog/announcing-hashicorp-boundary-0-4) and there are ample
25-
[tutorials](/boundary/tutorials/access-management/oss-vault-cred-brokering-quickstart) of this scenario.
25+
[tutorials](/boundary/tutorials/credential-management/community-vault-cred-brokering-quickstart) of this scenario.
2626
2. Boundary can use Vault as an OIDC provider to enable sign-in with Vault's supported auth methods (even non-OIDC auth methods like Active Directory kerberos/LDAP).
2727
This scenario is walked through in this [tutorial](/vault/tutorials/auth-methods/oidc-identity-provider).
2828
3. Boundary Community Edition can use Vault as the external KMS that serves as Boundary's root of trust. More information on this use case can be found
2929
[here](/boundary/docs/configuration/kms/transit).
3030

3131
## Q: What identity providers does Boundary support?
3232

33-
Boundary supports [OIDC authentication](/boundary/tutorials/access-management/oidc-auth), which allows support for many popular IdPs
33+
Boundary supports [OIDC authentication](/boundary/tutorials/identity-management/oidc-auth0), which allows support for many popular IdPs
3434
like Okta, Azure AD, Auth0, etc. For non-OIDC authentication protocols (such as LDAP), users can also log in with an OIDC bridge identity provider
35-
such as [Vault's OIDC bridge](/vault/docs/concepts/oidc-provider) capabilities released in 1.9, [Dex](https://dexidp.io), or various others.
35+
such as [Vault's OIDC bridge](https://developer.hashicorp.com/vault/docs/concepts/oidc-provider) capabilities released in 1.9, [Dex](https://dexidp.io), or various others.
3636

3737
## Q: Does Boundary support multi-factor authentication (MFA)?
3838

3939
Boundary Open-ID Connect (OIDC)-based authentication supports MFA if the IdP being used enforces MFA. This allows users to authenticate with an identity
4040
provider supporting MFA, such as Azure AD, Okta, Auth0, etc.
4141
Boundary also supports syncing permission claims between an IDP-managed identity and Boundary. This can be very useful when you want to sync group memberships
42-
from an IDP to Boundary to assign role assignments dynamically. See Boundary's [managed groups capabilities](/boundary/tutorials/configuration/oidc-idp-groups).
42+
from an IDP to Boundary to assign role assignments dynamically. See Boundary's [managed groups capabilities](/boundary/tutorials/identity-management/oidc-idp-groups).
4343

4444
## Q: Does Boundary automate the discovery and configuration of new targets (e.g. servers)? What happens if a host IP address changes?
4545

4646
Yes, this is one of the core competencies of Boundary. Boundary can discover new targets in two primary ways
4747
1. Boundary's [Terraform provider](https://registry.terraform.io/providers/hashicorp/boundary/latest/docs) supports discovery of targets provisioned by Terraform
48-
2. Boundary's [dynamic host catalog](/boundary/tutorials/access-management/aws-host-catalogs)
48+
2. Boundary's [dynamic host catalog](/boundary/docs/concepts/host-discovery)
4949
agentlessly queries infrastructure providers to automate the onboarding and configuration of hosts
5050

5151
All of these methods will automate the discovery and configuration of targets when their ip addresses change. Of course, static hosts can still be manually added via Boundary admin UI and CLI.
5252

5353
For more information on dynamic host catalogs, please see:
54-
- [Dynamic Host Catalog on AWS](/boundary/tutorials/access-management/aws-host-catalogs)
55-
- [Dynamic Host Catalogs on Azure](/boundary/tutorials/access-management/azure-host-catalogs)
54+
- [Dynamic host catalogs on AWS](/boundary/tutorials/host-management/aws-host-catalogs)
55+
- [Dynamic host catalogs on Azure](/boundary/tutorials/host-management/azure-host-catalogs)
5656

5757
## Q: Session management capabilities - Does Boundary support live session monitoring and termination?
5858

5959
**Session Logging/Monitoring:** Supported. Boundary creates a session log of all sessions created between identities and targets that have been onboarded to
60-
Boundary. You can learn how to monitor these sessions in this [tutorial](/boundary/tutorials/getting-started/getting-started-connect#manage-sessions).
61-
Boundary supports audit logs for [Boundary Community Edition](/boundary/tutorials/oss-configuration/event-logging) and [audit log streaming](/hcp/docs/boundary/audit-logging)
60+
Boundary. You can learn how to monitor these sessions in this [tutorial](/boundary/tutorials/community-administration/community-manage-sessions).
61+
Boundary supports audit logs for [Boundary Community Edition](/boundary/tutorials/self-managed-deployment/event-logging) and [audit log streaming](https://developer.hashicorp.com/hcp/docs/boundary/audit-logging)
6262
for HCP Boundary. Audit logs for both distributions can be exported to SIEM or BI tools.
6363

6464
**Session Termination:** Supported. Session termination for Boundary administrators is a supported capability, as demonstrated in this
65-
[tutorial](/boundary/tutorials/getting-started/getting-started-connect#manage-sessions).
65+
[tutorial](/boundary/tutorials/community-administration/community-manage-sessions).
6666

6767
## Q: As an AWS user, can IAM roles be used to configure Boundary's dynamic host catalog?
6868

6969
At this time, it is not possible to configure Boundary's dynamic host catalog using IAM roles.
7070
You can configure the dynamic host catalog using an IAM user, however.
71-
For more information, refer to the [Dynamic host catalogs on AWS](/boundary/tutorials/access-management/aws-host-catalogs) tutorial.
71+
For more information, refer to the [Dynamic host catalogs on AWS](/boundary/tutorials/host-management/aws-host-catalogs) tutorial.

content/boundary/v0.14.x/content/docs/concepts/domain-model/credential-libraries.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,7 @@ The example above uses the account email, but it could be any other parameter.
115115

116116
## Tutorial
117117

118-
Refer to the [SSH certificate injection with HCP Boundary](/boundary/tutorials/access-management/hcp-certificate-injection) tutorial to learn how to configure credential injection with SSH certificates using Vault.
118+
Refer to the [SSH certificate injection with HCP Boundary](/boundary/tutorials/credential-management/hcp-certificate-injection) tutorial to learn how to configure credential injection with SSH certificates using Vault.
119119

120120
## Referenced by
121121

0 commit comments

Comments
 (0)