diff --git a/ui/lib/core/addon/components/policy-example.hbs b/ui/lib/core/addon/components/policy-example.hbs index 638089f7522c..4c9ac3759871 100644 --- a/ui/lib/core/addon/components/policy-example.hbs +++ b/ui/lib/core/addon/components/policy-example.hbs @@ -6,15 +6,16 @@
{{#if (eq @policyType "acl")}}

- ACL Policies are written in Hashicorp Configuration Language ( - HCL + ACL Policies + are written in Hashicorp Configuration Language ( + HCL ) or JSON and describe which paths in Vault a user or machine is allowed to access. Here is an example policy:

{{else if (eq @policyType "rgp")}}

Role Governing Policies (RGPs) are tied to client tokens or identities which is similar to - ACL policies. They use - Sentinel + ACL policies. They use + Sentinel as a language framework to enable fine-grained policy decisions.

@@ -31,9 +32,9 @@ Endpoint Governing Policies (EGPs) are tied to particular paths (e.g. aws/creds/ ) instead of tokens. They use - Sentinel + Sentinel as a language to access - properties + properties of the incoming requests.

@@ -55,8 +56,11 @@ More information about {{uppercase @policyType}} policies can be found - + here. - +

\ No newline at end of file