From 1c9bfad2966ee2fde34e6201b33841c8c9bd1d47 Mon Sep 17 00:00:00 2001 From: Paul Gottschling Date: Thu, 6 Jun 2024 16:04:27 -0400 Subject: [PATCH] Incorporate messaging feedback (#42556) Respond to feedback from travelton in: - The new home page - The Teleport Agents introduction --- docs/pages/agents/introduction.mdx | 5 +++-- docs/pages/deploy-a-cluster/linux-demo.mdx | 2 +- docs/pages/index.mdx | 23 +++++++++++----------- 3 files changed, 16 insertions(+), 14 deletions(-) diff --git a/docs/pages/agents/introduction.mdx b/docs/pages/agents/introduction.mdx index ff5ad4513fdb2..70deed664a7e2 100644 --- a/docs/pages/agents/introduction.mdx +++ b/docs/pages/agents/introduction.mdx @@ -1,6 +1,6 @@ --- title: Protect Infrastructure with Teleport -description: Deploy Agents to enroll resources in your infrastructure with Teleport. You can run multiple Teleport services per Agent." +description: Deploy Agents to enroll resources in your infrastructure with Teleport. You can run multiple Teleport services per Agent. --- You can use Teleport to protect infrastructure resources like servers and @@ -52,7 +52,8 @@ They should be the only clients that can access a resource without Teleport. In this setup, Agents dial the Teleport Proxy Service in order to establish reverse SSH tunnels. While the Proxy Service remains open to the public internet -via its HTTPS port, Agents require no open ports or public address. +via its HTTPS port, Agents require only outbound network access to the Proxy +Service, and can run behind a firewall. The Teleport Proxy Service uses these reverse tunnels to forward traffic in Teleport's supported protocols to an available Agent. Agents apply RBAC diff --git a/docs/pages/deploy-a-cluster/linux-demo.mdx b/docs/pages/deploy-a-cluster/linux-demo.mdx index f507c3582384b..8c1182f8cb7d7 100644 --- a/docs/pages/deploy-a-cluster/linux-demo.mdx +++ b/docs/pages/deploy-a-cluster/linux-demo.mdx @@ -198,7 +198,7 @@ Linux server. ## Next step: deploy agents -Teleport **agents** proxy traffic to infrastructure resources like servers, +Teleport **Agents** proxy traffic to infrastructure resources like servers, databases, Kubernetes clusters, cloud provider APIs, and Windows desktops. Step 4 showed you how to install agents manually, and you can also launch agents diff --git a/docs/pages/index.mdx b/docs/pages/index.mdx index 924811b0eb69b..8a9ffad00074f 100644 --- a/docs/pages/index.mdx +++ b/docs/pages/index.mdx @@ -1,6 +1,7 @@ --- -title: Introduction to Teleport -description: Provides an overview of the purpose and benefits of Teleport Access Platform, which allows you to implement Zero Trust for all of your infrastructure. +h1: Introduction to Teleport +title: "Introduction to the Teleport Access Platform: Zero Trust Security for Your Infrastructure" +description: Read an overview of the Teleport Access Platform. Learn how to implement Zero Trust Security across all your infrastructure for enhanced protection and streamlined access control. tocDepth: 3 --- @@ -70,7 +71,7 @@ Get started with Teleport Access: **Teleport Identity** is an add-on to Teleport Access that offers identity governance and security for all of your infrastructure. You can provide users -less-privileged roles by default, requiring any user who wants additional +with less-privileged roles by default, requiring any user who wants additional permissions to request them for a limited time. This approach leaves no permanent admin roles for attackers to target. @@ -100,9 +101,9 @@ Get started with Teleport Identity: ### Teleport Policy -**Teleport Policy** unifies and controls access policies across all of your -infrastructure. With Teleport Access Graph, you can get insight into role-based -access control policies, including in Teleport and your cloud provider. +**Teleport Policy** unifies and controls access policies across all your +infrastructure. With Teleport Access Graph, you gain insights into role-based +access control policies within Teleport and your cloud provider. Get started with [Teleport Access Graph](access-controls/access-graph.mdx). @@ -112,11 +113,11 @@ The Teleport Access Platform consists of a certificate authority and identity-aware access proxy that run either on the Teleport-managed cloud or, in special cases, a self-hosted private network. -Teleport Agents, which the user deploys on Linux servers or Kubernetes, proxy -access to infrastructure resources and cloud provider APIs. Users authenticate -to infrastructure resources through Teleport agents using short-lived -certificates. Certificates indicate Teleport role membership, allowing Teleport -Agents to enforce role-based access-controls. +Teleport Agents, which can run on Linux servers or Kubernetes, proxy access to +infrastructure resources and cloud provider APIs. Users authenticate to +infrastructure resources through Teleport Agents using short-lived certificates. +Certificates embed Teleport user attributes, allowing Teleport Agents to enforce +role-based access controls. Learn more: