[docs] Adjusting more links for rewrite project (#2791)

* Removing in query param from tutorial link

* Updating link to renamed tutorial

* Fixing broken link syntax
pull/2793/head
Ashlee M Boyer 3 years ago committed by GitHub
parent e238893c21
commit a437bdae0a
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

@ -105,4 +105,4 @@ The following services are relevant to this resource:
## Tutorial
Refer to the[] Manage Sessions with HCP Boundary](https://learn.hashicorp.com/tutorials/boundary/hcp-manage-sessions) tutorial to learn how to start, view, and cancel a session.
Refer to the [Manage Sessions with HCP Boundary](https://learn.hashicorp.com/tutorials/boundary/hcp-manage-sessions) tutorial to learn how to start, view, and cancel a session.

@ -8,4 +8,4 @@ description: Compares Boundary to using a Software Defined Perimeter solution
Software Defined Perimeter (SDP) solutions secure access to applications and infrastructure based on user identity.
Boundary is fundamentally an SDP solution that takes a zero trust approach to security design for system access; access to services is granted based on the scoped identity and intent of a user.
Boundary is a scalable proxy that enables identity-based access with multiple layers of security controls including [dynamic credentials](https://developer.hashicorp.com/boundary/tutorials/hcp-administration/hcp-ssh-cred-injection?in=boundary%2Fhcp-administration), [context-based access](https://developer.hashicorp.com/boundary/tutorials/access-management/oidc-idp-groups), [automated service discovery](docs/concepts/service-discovery), and [access auditing](https://developer.hashicorp.com/hcp/docs/boundary/audit-logging) to name a few.
Boundary is a scalable proxy that enables identity-based access with multiple layers of security controls including [dynamic credentials](https://developer.hashicorp.com/boundary/tutorials/hcp-administration/hcp-ssh-cred-injection), [context-based access](https://developer.hashicorp.com/boundary/tutorials/access-management/oidc-idp-groups), [automated service discovery](docs/concepts/service-discovery), and [access auditing](https://developer.hashicorp.com/hcp/docs/boundary/audit-logging) to name a few.

@ -17,7 +17,7 @@ While Vault isn't a *required* secrets backend for Boundary sessions, the potent
value proposition for identity-based access.There are three primary points of integration with Vault:
1. Vault can be used as a secrets backend for Boundary, offering single signon to end target systems via credential brokering. This was covered in Boundary's
[0.4 announcement](https://www.hashicorp.com/blog/announcing-hashicorp-boundary-0-4) and there are ample
[tutorials](https://learn.hashicorp.com/tutorials/boundary/vault-cred-brokering-quickstart) of this scenario.
[tutorials](/boundary/tutorials/access-management/oss-vault-cred-brokering-quickstart) of this scenario.
2. Boundary can use Vault as an OIDC provider to enable sign-in with Vault's supported auth methods (even non-OIDC auth methods like Active Directory kerberos/LDAP).
This scenario is walked through in this [tutorial](https://learn.hashicorp.com/tutorials/vault/oidc-identity-provider).
3. OSS Boundary can use Vault as the external KMS that serves as Boundary's root of trust. More information on this use case can be found

Loading…
Cancel
Save