docs: Minor edit

pull/4866/head
Dan Heath 2 years ago
parent dd3314864d
commit f51dee4aee

@ -114,7 +114,7 @@ SSH targets use injected application credentials to authenticate an SSH session
Injected credentials allow users to securely connect to remost hosts using SSH, while never being in the possession of a valid credential for that target host.
The injected credentials can be a username/password or username/private key credential from Vault [credential libraries][] or they can be static [credentials][] or an SSH certificate from Vault SSH credential libraries.
SSH targets require you to configure injected credentials in order to create a session.
SSH targets require you to configure injected credentials to create a session.
If you attempt to create a session against an SSH target without configuring injected credentials, it results in an error.
However, you can use brokered credentials with SSH targets for purposes other than establishing the initial SSH connection.

Loading…
Cancel
Save