Skip to content

Commit

Permalink
Incorporate messaging feedback (#42556)
Browse files Browse the repository at this point in the history
Respond to feedback from travelton in:
- The new home page
- The Teleport Agents introduction
  • Loading branch information
ptgott committed Jun 6, 2024
1 parent 7f2408b commit 1c9bfad
Show file tree
Hide file tree
Showing 3 changed files with 16 additions and 14 deletions.
5 changes: 3 additions & 2 deletions docs/pages/agents/introduction.mdx
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
title: Protect Infrastructure with Teleport
description: Deploy Agents to enroll resources in your infrastructure with Teleport. You can run multiple Teleport services per Agent."
description: Deploy Agents to enroll resources in your infrastructure with Teleport. You can run multiple Teleport services per Agent.
---

You can use Teleport to protect infrastructure resources like servers and
Expand Down Expand Up @@ -52,7 +52,8 @@ They should be the only clients that can access a resource without Teleport.

In this setup, Agents dial the Teleport Proxy Service in order to establish
reverse SSH tunnels. While the Proxy Service remains open to the public internet
via its HTTPS port, Agents require no open ports or public address.
via its HTTPS port, Agents require only outbound network access to the Proxy
Service, and can run behind a firewall.

The Teleport Proxy Service uses these reverse tunnels to forward traffic in
Teleport's supported protocols to an available Agent. Agents apply RBAC
Expand Down
2 changes: 1 addition & 1 deletion docs/pages/deploy-a-cluster/linux-demo.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -198,7 +198,7 @@ Linux server.

## Next step: deploy agents

Teleport **agents** proxy traffic to infrastructure resources like servers,
Teleport **Agents** proxy traffic to infrastructure resources like servers,
databases, Kubernetes clusters, cloud provider APIs, and Windows desktops.

Step 4 showed you how to install agents manually, and you can also launch agents
Expand Down
23 changes: 12 additions & 11 deletions docs/pages/index.mdx
Original file line number Diff line number Diff line change
@@ -1,6 +1,7 @@
---
title: Introduction to Teleport
description: Provides an overview of the purpose and benefits of Teleport Access Platform, which allows you to implement Zero Trust for all of your infrastructure.
h1: Introduction to Teleport
title: "Introduction to the Teleport Access Platform: Zero Trust Security for Your Infrastructure"
description: Read an overview of the Teleport Access Platform. Learn how to implement Zero Trust Security across all your infrastructure for enhanced protection and streamlined access control.
tocDepth: 3
---

Expand Down Expand Up @@ -70,7 +71,7 @@ Get started with Teleport Access:

**Teleport Identity** is an add-on to Teleport Access that offers identity
governance and security for all of your infrastructure. You can provide users
less-privileged roles by default, requiring any user who wants additional
with less-privileged roles by default, requiring any user who wants additional
permissions to request them for a limited time. This approach leaves no
permanent admin roles for attackers to target.

Expand Down Expand Up @@ -100,9 +101,9 @@ Get started with Teleport Identity:

### Teleport Policy

**Teleport Policy** unifies and controls access policies across all of your
infrastructure. With Teleport Access Graph, you can get insight into role-based
access control policies, including in Teleport and your cloud provider.
**Teleport Policy** unifies and controls access policies across all your
infrastructure. With Teleport Access Graph, you gain insights into role-based
access control policies within Teleport and your cloud provider.

Get started with [Teleport Access Graph](access-controls/access-graph.mdx).

Expand All @@ -112,11 +113,11 @@ The Teleport Access Platform consists of a certificate authority and
identity-aware access proxy that run either on the Teleport-managed cloud or, in
special cases, a self-hosted private network.

Teleport Agents, which the user deploys on Linux servers or Kubernetes, proxy
access to infrastructure resources and cloud provider APIs. Users authenticate
to infrastructure resources through Teleport agents using short-lived
certificates. Certificates indicate Teleport role membership, allowing Teleport
Agents to enforce role-based access-controls.
Teleport Agents, which can run on Linux servers or Kubernetes, proxy access to
infrastructure resources and cloud provider APIs. Users authenticate to
infrastructure resources through Teleport Agents using short-lived certificates.
Certificates embed Teleport user attributes, allowing Teleport Agents to enforce
role-based access controls.

Learn more:

Expand Down

0 comments on commit 1c9bfad

Please sign in to comment.