You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* docs: update local users
* docs: update verbiage for local users
Co-authored-by: Paul Gottschling <[email protected]>
---------
Co-authored-by: Paul Gottschling <[email protected]>
Copy file name to clipboardExpand all lines: docs/pages/zero-trust-access/management/admin/users.mdx
+12-11Lines changed: 12 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,11 +31,13 @@ A Teleport administrator creates Teleport user accounts and maps them to the rol
31
31
32
32
Let's look at this table:
33
33
34
-
| Teleport User |Allowed OS Logins | Description |
34
+
| Teleport User |SSH Logins | Description |
35
35
| - | - | - |
36
-
|`joe`|`joe`, `root`| Teleport user `joe` can log in to member Nodes as user `joe` or `root` on the OS. |
37
-
|`bob`|`bob`| Teleport user `bob` can log in to member Nodes only as OS user `bob`. |
38
-
|`kim`|| If no OS login is specified, it defaults to the same name as the Teleport user, `kim`. |
36
+
|`joe`|`joe`, `root`| Teleport user `joe` can log in as user `joe` or `root` on SSH servers. |
37
+
|`bob`|`bob`| Teleport user `bob` can log in as user `bob` on SSH servers. |
38
+
|`kim`|| Teleport user 'kim' has no designated SSH logins. |
39
+
40
+
SSH logins are some of the user traits available in Teleport roles. For all supported traits, see the reference for [`tctl users add`](../../../reference/cli/tctl.mdx#tctl-users-add).
39
41
40
42
Let's add a new user to Teleport using the `tctl` tool:
41
43
@@ -66,10 +68,9 @@ NOTE: Make sure <proxy_host>:443 points at a Teleport proxy which users can acce
66
68
The user completes registration by visiting this URL in their web browser,
67
69
picking a password, and configuring multi-factor authentication. If the
68
70
credentials are correct, the Teleport Auth Service generates and signs a new
69
-
certificate, and the client stores this key and will use it for subsequent
70
-
logins.
71
+
user certificate.
71
72
72
-
The key will automatically expire after 12 hours by default, after which
73
+
The certificate will automatically expire after 12 hours by default, after which
73
74
the user will need to log back in with their credentials. This TTL can be
74
75
configured to a different value.
75
76
@@ -78,11 +79,11 @@ Once authenticated, the account will become visible via `tctl`:
0 commit comments