-
Notifications
You must be signed in to change notification settings - Fork 4.2k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
[BACKPORT] Manual cherry-pick of failed release/1.14.x backport PRs (#…
…26994) * [docs] fix lack of space character (#26830) * fix lack of space char https://developer.hashicorp.com/vault/docs/concepts/policies#ui-policy-requirements `to the ui/mountsand ui/resultant-acl` needs a space after mounts * add nonbreaking space to help parser add nonbreaking space to help parser Co-authored-by: Sarah Chavis <[email protected]> --------- Co-authored-by: Sarah Chavis <[email protected]> * Add reading guide for designing Vault clusters (#26947) * Remove duplicate nav entry * fix url to anti patterns (#26975) --------- Co-authored-by: CJ <[email protected]>
- Loading branch information
1 parent
f6f6b03
commit 7cc55f0
Showing
2 changed files
with
28 additions
and
1 deletion.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,27 @@ | ||
<Warning title="Set UI policies before enabling the UI"> | ||
|
||
You cannot make policy adjustments or overwrites to the <code>ui/mounts</code> | ||
and <code>ui/resultant-acl</code> endpoints once you enable the Vault UI. Vault | ||
ignores policy updates that target these paths | ||
with <a href="/vault/docs/concepts/policies#deny">explicit <code>deny</code></a> capabilities. | ||
|
||
</Warning> | ||
|
||
Depending on your Vault configuration, you may need to define UI policies | ||
with different ACL capabilities from the permissions provided by your Vault CLI | ||
policies. | ||
|
||
The `default` UI policy includes two paths, **which cannot be modified with | ||
additional policies** once you | ||
[enable](/vault/docs/configuration/ui#activating-the-vault-ui) the UI: | ||
|
||
- [/sys/internal/ui/mounts](/vault/api-docs/system/internal-ui-mounts) - | ||
provides a list of currently visible mounts based on the | ||
[`listing_visibility`](/vault/api-docs/system/mounts#listing_visibility) | ||
parameter. `sys/internal/ui/mounts` is an unauthenticated, internal endpoint | ||
used for UI and CLI preflight checks. Requests that include an `X-Vault-Token` | ||
will return all mounts the token has path capabilities on. | ||
- [/sys/internal/ui/resultant-acl](/vault/api-docs/system/internal-ui-resultant-acl) - | ||
repackages authentication information used by the UI. **If you do not have have | ||
permission to call the `ui/resultant-acl` endpoint, you may receive warnings or | ||
errors in the UI**. |