Skip to content

Commit 3b51bea

Browse files
authored
Merge pull request #65749 from EricPonvelle/Modules-Clean-Up
Removed the context items from these two modules.
2 parents 170994e + 2b3539f commit 3b51bea

File tree

2 files changed

+0
-6
lines changed

2 files changed

+0
-6
lines changed

modules/rosa-attaching-the-policy.adoc

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,10 @@
11
// Module included in the following assemblies:
22
//
33
// * rosa-adding-additional-constraints-for-ip-based-aws-role-assumption/rosa-attaching-the-policy.adoc
4-
54
:_content-type: PROCEDURE
65
[id="rosa-attaching-the-policy_{context}"]
76
= Attaching the identity-based IAM policy
87

9-
:context: rosa-attaching-the-policy
10-
118
Once you have created an identity-based IAM policy, attach it to the relevant IAM users, groups, or roles in your AWS account to prevent IP-based role assumption for those entities.
129

1310
.Procedure

modules/rosa-create-an-identity-based-policy.adoc

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,10 @@
11
// Module included in the following assemblies:
22
//
33
// * rosa-adding-additional-constraints-for-ip-based-aws-role-assumption/rosa-create-an-identity-based-policy.adoc
4-
54
:_content-type: PROCEDURE
65
[id="rosa-create-an-identity-based-policy_{context}"]
76
= Create an identity-based IAM policy
87

9-
:context: rosa-create-an-identity-based-policy
10-
118
You can create an identity-based Identity and Access Management (IAM) policy that denies access to all AWS actions when the request originates from an IP address other than Red Hat provided IPs.
129

1310
.Prerequisites

0 commit comments

Comments
 (0)